|
[1]Ohkubo, M., K. Suzki, and S. Kinoshita, "Cryptographic Approach to 'Privacy friendly' Tags," Proc. of RFID Privacy Workshop, MIT, MA, USA, 2003. [2]Rhee, K., J. Kwak, S. Kim and D. Won, "Challenge-Response Based RFID Authentication Protocols for Distributed Database Environment," Proc. of International Conference on Security in Pervasive Computing, pp.70-84, 2005. [3]Ranasinghe, D.C., D.W. Engels and P.H. Cole, "Low-Cost RFID System: Confronting Security and Privacy, " Proc. of Auto-ID Laboratory Workshop, 2004. [4]Feldhofer, M., S. Dominikus and J. Wolkerstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm," Proc. of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS Vol. 3156, pp.57-370, 2004. [5]Weis, S.A., S.E. Sarma, R.L. Rivest and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, " Proc. of International Conference on Security in Pervasive Computing, pp.201-212, 2003. [6]Liu, Z. and D. Peng, "True Random Number Generator in RFID Systems against Traceability, "Proc. of the 3rd Internation Conference on Consumer Communications and Networking, 2006. [7]Chien, H.Y. and C.H. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standard," Computer Standards & Interfaces , Vol. 29, Issue 2, pp.254-259. [8]Duc, D.N., J. Park, H. Lee and K. Kim, "Enhancing Security of EPCglobal GEN-2 RFID Tag against Traceability and Cloning," Proc. of the 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, 2006. [9]Karthikeyan, S. and M. Nesterenko, "RFID Security Without Extensive Cryptography," Proc. of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp.63-67. [10]Osaka, K., T. Takagi, K. Yamazaki and O. Takahashi, "An Efficient and secure RFID Security Method with Ownership Transfer," Proc. of International Conference on Computational Intelligence and Security, Guangzhou, China, Vol.2, pp. 1090-1095, 2006. [11]Henrici, D. and P. Müller, "Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," Proc. of International Conference on Pervasive Computing and Communications Security, Orlando, Florida, USA PERCOMW, 2004. [12]Dimitriou, T., "A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks, " Proc. of Internation Conference on Secuirty and Privacy for Emerging Areas in Communication Networks, Athens, Greece, 2005. [13]Tsudik, G., "YATRAP: Yet Another Trivial RFID Authentication Protocol," Proc. of International Conference on Pervasive Computing and Communications, Pisa, Italy, 2006. [14]Sarma, S., S. Weis, and D. Engels, "RFID Systems, Security and Privacy Implications," Technical Report MIT-AUTOID-WH014, AutoID Center, MIT, 2002. [15]Chen, Y.J. and S.J. Chen, "Designing a Low-Cost RFID System with Security and Privacy Protection," Proc. of the 2007 Information Security Conference, 2007. [16]Chien, H.Y., "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," Porc. Of International Conference on Transactions on Dependable and Secure Computing, Vol. 4, NO. 4, 2007. [17]Peris-Lopez, P., J.C. Hernandez-Castro, J.M. Estervez-Tapiador and A. Ribagorda, "EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. of OTM Federated Conferences on IS Workshop, 2006. [18]Peris-Lopez, P., J.C. Hernandez-Castro, J.M. Estervez-Tapiador and A. Ribagorda, "M2AP: A minimalist Mutual Authenticaion Protocol for Low-Cost RFID tags," Proc. of International Conference on Ubiquitous Intelligence and Computing, LNCS Vol. 4159, pp: 912-923, 2006. [19]Peris-Lopez, P., J.C. Hernandez-Castro, J.M. Estervez-Tapiador and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentciaion Protocol for Low-Cost RFID tags," Proc. of the 2nd Workshop on RFID Security, 2006. [20]Li, T., and G. Wang, "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols," Proc. of the IFIP International Information Security Conference, 2007. [21]Chien, H.Y. and C.W. Huang, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements," ACM SIGOPS Operating Systems Review, Vol.41 Issue 4, 2007. [22]Weis, S.A., "Security and Privacy in Radio-Frequency Identification Devices," Masters Thesis MIT., 2003. [23]Juel, A. and S.A. Weis, "Authenticating Pervasive Devices with human Protocols," Advances in Cryptology, Lecture Notes in Computer Science. Springer-Verlag, http://www.rsasecurity.com/rsalabs/, 2005. [24]Avoine, G., “Radio Frequency Identification: Adversary Model and Attacks on Existing Protocols,” Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland, 2005. [25]Tan, C.C., B. Sheng and Q. Li, "Serverlesss Search and Authentciation Protocols for RFID," Proc. of the 5th International Conference on Pervasive Computing and Communication, 2007.
|