참고문헌
- Raphael C.-W. Phan, "Cryptanalysis of a New Ultra-lightweight RFID Authentication Protocol-SASI", IEEE Transaction on Dependable and Secure Computing, V.6, N.4, pp.316-320, Oct 2009 https://doi.org/10.1109/TDSC.2008.33
- George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
- Dong-liang Wu, "A brief Survey on Current RFID Application", Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009, pp.2330-2335
- S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.A
- M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.31, n.56, pp.357-370, 2004
- Yanjun Zuo, "Survivable RFID Systems: Issues, Challenges, and Techniques", IEEE Transaction on Systems Man and Cybernetics,-Part C: Applications and reviews, v. 40, n. 4, pp. 406-418, July 2010
- P. Peris-Lopez, etcs, "LMAP: A Real Lightweight Low-cost RFID Tags", Proc. Second Workshop RFID Security, July, 2006
- P. Peris-Lopez, etcs, "EMAP: An Efficient Mutal Authentication Protocol for Low-Cost RFIDs", Proc. OTM Federated Conf and Workshop: IS Workshop, Nov. 2006
- Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352-361. Springer, Heidelberg, 2006
- Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008
- Selwyn Piramuthu, "Lightweight Cryptographic Authentication in Passive RFID Tagged Systems," IEEE Tran. On Systems, Man, and Cybernetics-Part C: Applications and review, v.38, n.3, pp.360-376, May 2008 https://doi.org/10.1109/TSMCC.2007.913918
- P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Rib-agorda, "RFID systems: A survey on security threats and proposed solutions," in 11th IFIP International Conference on Personal Wireless Communications - PWC06, ser. Lecture Notes in Computer Science, vol.4217. Springer-Verlag, September 2006, pp. 159-170.
- Ari Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal of selected areas in communications, V.24, N.2, pp.381-394, February, 2006 https://doi.org/10.1109/JSAC.2005.861395
- P. Ekdahl, and T. Johansson, "Another attack on A5/1", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003A https://doi.org/10.1109/TIT.2002.806129
- Martin Feldhofer, "Strong crypto for RFID Tag, - A comparison of low power hardware implementation", 2007 IEEE, pp.1839-1842
- Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Trans. on Network and Service Management, V. 6, N. 3, pp.190-205, Sep. 2009. https://doi.org/10.1109/TNSM.2009.03.090305
- J.D.H, etcs, "Strong Authentication and improving privacy with ultra-weight RFID authentication Protocol", KIISC, v.19, n.19, pp.81-91, 2009
- P. Peris-Lopez, etcs, "M2AP: A Minimalist mutual authentication Protocol for Low-cost RFID Tags", Proc. Int' Conf Ubiquitous Intelligence and Computing, pp.912-923, 2006.
- H.Y. Chien. "SASI: A New Ultra-weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing., vol.4, n.4, pp.337-340, Oct. 2007 https://doi.org/10.1109/TDSC.2007.70226
- Karygiannis, "Karygianni's Taxonomy Model in RFID Threats", 2008 11th IEEE International Conference on Communication Technology Proceedings, pp.765-768