JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 154-159.doi: 10.6040/j.issn.1671-9352.2.2014.133
Previous Articles Next Articles
WANG Xu-yu, JING Feng-xuan, WANG Yu-qing
CLC Number:
[1] 游战清.无线射频识别技术(RFID)理论与应用[M].北京:电子工业出版社,2004:13-17. YOU Zhanqing. Theory and application of radio frequency identification (RFID) [M]. Beijing: Publishing House of Electronics Industry, 2004:13-17. [2] 康东, 石喜勤, 李勇鹏,等. 射频识别(RFID)核心技术与典型应用开发案例[M].第1版. 北京:人民邮电出版社, 2008:155-156. KANG Dong, SHI Xiqin, LI Yongpeng, et al. Radio frequency identification (RFID) core technology and typical application development case [M]. 1st ed. Beijing: People's Posts and Telecommunications Press, 2008:155-156. [3] SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHE 2002). Berlin: Springer, 2002:454-469 [4] WEIS S A, SARMA S E, RIVEST R L, et al.Security and privacy aspects of low-cost radio frequency identification systems[C]//Proceeding of the1st International Conference on Security in Pervasive Computing. Berlin: Springer, 2003:201-212. [5] HENRICI D, MULLER P.Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]//Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04). Washington: IEEE Computer Society, 2004:149-153. [6] Stuart Haber, W Scott Stornetta. How to time-stamp a digital document [J]. Journal of Cryptology, 1991, 3(2):99-111. [7] 谢晓尧.电子商务网络协议的形式化分析理论与应用[M].北京:科学出版社,2008:15-17. XIE Xiaoyao.The electronic commerce network protocols formal analysis: theory and applications[M]. Beijing: Science Press, 2008: 15-17. [8] 李红静,刘丹.基于矩阵理论的RFID认证协议设计及BAN逻辑分析[J].计算机应用,2013, 33(7):1854-1857. LI Hongjing, LIU Dan. Matrix-based authentication protocol for RFID and BAN logic analysis[J]. Journal of Computer Applications, 2013, 33(7):1854-1857. [9] TSAI J J P, YANG Jennhwa, CHANG Yao-Hsiung. Timing constraint Petri nets and their application to schedulability analysis of real-time system specifications [J]. IEEE Transactions on Software Engineering, 1995, 21(1):32-49. [10] 张兵,马新新,秦志光.基于hash运算的RFID认证协议分析和改进[J].计算机应用研究,2011, 28(11):4311-4314. ZHANG Bing, MA Xinxin, QIN Zhiguang. Analysis and improvement of hash-based RFID authentication protocol[J]. Application Research of Computers, 2011, 28(11): 4311-4314. |
[1] | WAN Zhi-ping. An authentication protocol based on hybrid Das protocol for wireless sensor networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(05): 12-17. |
[2] | RAO Xu-li1, ZHANG Mei-ping2, XU Li2. The RFID card reader system design based on Zigbee technology [J]. J4, 2013, 48(7): 62-67. |
[3] | RAO Xu-li1, ZHANG Mei-ping2, MA Xian-hu2. Design of laboratory equipment monitoring management system based on the internet of things [J]. J4, 2012, 47(11): 74-77. |
[4] | LI Lin . Cryptanalysis of MD4 [J]. J4, 2007, 42(4): 1-05 . |
[5] | LI Lin . The collision attack on the last three rounds of RIPEMD-128 [J]. J4, 2007, 42(3): 1-07 . |
|