Citation: | CHEN Xiuqing, CAO Tianjie, ZHAI Jingxuan, “Untraceability Analysis of Two RFID Authentication Protocols,” Chinese Journal of Electronics, vol. 25, no. 5, pp. 912-920, 2016, doi: 10.1049/cje.2016.08.013 |
O.K. Ha, et al., "Relation model describing the effects of introducing RFID in the supply chain:evidence from the food and beverage industry in South Korea", Personal and Ubiquitous Computing, Vol.18, No.3, pp.553-561, 2014.
|
H. Fernando and J. Abawajy, "Mutual authentication protocol for networked RFID systems", Proc. of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference, New York, USA, pp.417-424, 2011.
|
Z. Qian, et al., "ACSP:A novel security protocol against counting attacks for UHF RFID systems", Computers & Mathematics with Applications, Vol.63, No.2, pp.492-500, 2012.
|
M. Safkhani, et al., "On the security of RFID anti-counting security protocol (ACSP)", Journal of Computational and Applied Mathematics, Vol.259, No.PartB, pp.512-521, 2014.
|
H. Ning, et al., "Ultralightweight RFID Authentication Protocol Based on Random Partitions of Pseudorandom Identifier and Pre-shared Secret Value", Chinese Journal of Electronics, Vol.20, No.20, pp.228-232, 2011.
|
M.R. Alagheband and M.R. Aref., "Simulation-based traceability analysis of RFID authentication protocols", Wireless Personal Communications, Vol.77, No.2, pp.1019-1038, 2014.
|
D. Moriyama, Lightweight Cryptography for Security and Privacy, Springer Berlin Heidelberg, Berlin, German, pp.114-129, 2013.
|
S. Kardaş, et al., Lightweight Cryptography for Security and Privacy, Springer Berlin Heidelberg, Berlin, German, pp.130-141, 2013.
|
S. Vaudenay, Advances in Cryptology-ASIACRYPT 2007. Springer Berlin Heidelberg, Berlin, German, pp.68-87, 2007.
|
L. Jian, et al., "ID updating-based RFID mutual authentication protocol for low-cost tags", China Communications, Vol.8, No.7, pp.122-127, 2011.
|
K. Ouafi and R.C.W. Phan, Proc. of the Applied Cryptography and Network Security, Springer Berlin Heidelberg, Berlin, German, Vol.5037, No.7, pp.479-489, 2008.
|
C.H. Lim and T. Kwon, Information and Communications Security, Springer Berlin Heidelberg, Berlin, German, pp.1-20, 2006.
|
H.Y. Chien, et al., "Non-linearity cannot help RFID resist fulldisclosure attacks and terrorist fraud attacks", Security and Communication Networks, Vol.6, No.12, pp.1490-1495, 2013.
|