|
[1]H.Y. Chien, “SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,” IEEE Transactions on Dependable and Secure Computing,Vol.4, No.4, pp. 337–340, 2007. [2]M. Kianersi, M. Gardeshi and M. Arjmand, “SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol For Low-Cost RFID Tags,” International Journal of UbiComp (IJU), Vol.2, No.2, April 2011. [3]M. Kianersi, M. Gardeshi, and H. Yousefi, “Security Analysis of Ultra-lightweight Protocol for Low-Cost RFID Tags: SSL-MAP,” WiMo/CoNeCo, CCIS 162, pp. 236–245, 2011. [4]Y.C Lee, Y.C Hsieh, P.S You, and T.C. Chen, “A New Ultralightweight RFID Protocol with Mutual Authentication,” WASE International Conference on Information Engineering, 2009. [5]Z.Bilal, A .Masood and F. Kausar, “Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol,” International Conference on Network-Based Information Systems, 2009. [6]D. Tagra, M. Rahman and S. Sampalli, “Technique for preventing DoS attacks on RFID systems,” International Conference onSoftware, Telecommunications and Computer Networks (SoftCOM), 2010. [7]M. David and N. R. Prasad, “Providing Strong Security and High Privacy in Low-Cost RFID network,” MobiSec, LNICST 17, pp. 172-179, 2009. [8]J. C. Hernandez-castro, P. Peris-lopez, R. C. W.Phan and J. M. E. Tapiador, “Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol,” RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification, 2010. [9]H. M Sun, W. C. Ting, and K. H. Wang, “On the Security of Chien’s Ultralightweight RFID Authentication Protocol,” IEEE Transactions On Dependable And Secure Computing, Vol. 8, No. 2, 2011. [10]K. H. Yeh, N.W. Lo, Y. Li, Y.C. Chen and T.C. Wu, “New Findings on RFID Authentication Schemes against De-synchronization Attack,” accepted by International Journal of Innovative Computing, Information and Control, Sep 2011. [11]Pedro, P. Lopez, Julio, C. Hernandez, Juan, M. Estevez Tapiador and Arturo Ribagorda, “M2AP: A minimalist mutual authentication protocol for low-cost RFID tags,” Proc. of UIC’06, Vol. 4159 of LNCS, pp 912–923, 2006. [12]Pedro, P. Lopez, Julio, C. Hernandez, Juan, M. Estevez Tapiador and Arturo Ribagorda, “LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags,” Hand. Of Workshop on RFID and Lightweight Cryptography,2006. [13]Pedro, P. Lopez, Julio, C. Hernandez, Juan, M. Estevez Tapiador and Arturo Ribagorda, “EMAP: An efficient mutual authentication protocol for low-cost RFID tags,” Proc. of IS’06, Springer-Verlag, Vol. 4277, LNCS, pp 352–361, 2006. [14]T. Li and R. Deng, “Vulnerability analysis of EMAP an efficient RFID mutual authentication protocol,”Proc. of AReS, 2007. [15]T. Li, G. Wang, “Security analysis of two ultra-lightweight RFID authentication protocols,” Proc. of IFIP-SEC, 2007. [16]Yu C. Hung and Wei H. Chen, “Security of ultra-lightweight RFID authentication protocols and its improvements,” SIGOPS Oper. Syst.Vol. 41, No. 4, 83–86, 2007. [17]M. Barasz, B. Boros, P. Ligeti, K. Loja and D. Nagy, “Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags,” Proc. of First International EURASIP Workshop on RFID Technology, 2007. [18]T. Cao, E. Bertino, and H. Lei, “Security Analysis of the SASI Protocol,” IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 1, pp. 73–77, 2009. [19]P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Tapiador, and A. Ribagorda “Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol”, Information Security Applications, Lecture Notes in Computer Science, LNCS, Vol. 5379, pp. 56-68, 2009. [20]J. C. H. Castro, J. M. Est’evez Tapiador, P. Peris-Lopez, and J. J. Quisquater, “Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations,” CoRR, Vol. abs/0811.4257, 2008. [21]Eslam Gamal, Emanshaaban, and Mohamed Hashem, “Lightweight Mutual Authentication Protocol for Low Cost RFID Tags,” International Journal of Network Security & Its Applications (IJNSA), Vol 2, No. 2. pp 27-37, 2010. [22]N Ram and R Suganya, “SSL-MAP: A More Secure Gossamer Based Mutual authentication Protocol for Passive RFID Tags,” International Journal on Computer Science and Engineering, Vol. 02, pp 363-367, 2010.
|