참고문헌
- S. A. Weis, "Security an Privacy in Radio-Frequency Identification Devices," MS Thesis. MIT. May, 2003.
- S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W.Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2003.
- S. E. Sarma, S. A. Weis, D. W. Engels. "RFID systems, security & privacy implications," White Paper MIT-AUTOID-WH_014, MIT AUTO-ID CENTER, 2002.
- A. Juels and R. Pappu, "Squealing euros: privacy protection in RFID-enabled banknotes," In proceedings of Financial Cryptography-FC'03, Vol. 2742 LNCS, pp. 103-121, Springer-Verlag, 2003.
- F. Klaus, "RFID handbook," Second Edition, Jone Willey & Sons, 2003.
- Dong-ho Jeon, Hae-moon Kim, Hye-jin Kwon, Soon-ja Kim, "Hash-based Mutual Authentication Protocol for RFID Environment", Journal of the Korea Information and Communications Society, 35(1), pp. 42-52, Jan, 2010.
- Gene Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol", Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops, pp. 640-643, Mar. 2006.
- J. Aragones, A. Martinez-Balleste, and A. Solanas, "A brief survey on rfid privacy and security", In World Congress on Engineering, 2007.
- M. Ohkubo, K. Suzuki and S. Kinoshita, "Hash-chain based forward secure privacy protection sheme for low-cost RFID", Proceedings of the 2004 Symposium on Cryptography and formation Security.Sendai, pp. 719-724, 2004.
- D.W.Hong, K.Y.Chang, T.J.Park, K.I.Chung, "Trend of Cryptography for Ubiquitous Environment," Electronics and Telecommunications Trends, 20(1), pp. 63-72, Feb, 2005.
- Korea Information Security Agency, "RFID Privacy GuideLine", Sep, 2007.
- Tae Youn Won, Il Jung Kim, Eun Young Choi, Dong Hoon Lee, "Encryption scheme suitable to RFID Systems based on EPC Generation," Journal of the Korea Institute of Information Security and Cryptology, 18(1), pp. 67-75, Feb, 2008.
- Jung-Sik Cho, Sang-Soo Yeo, Sung-Kwon Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value", Computer Communications, Vol. 34, No. 3, pp.391-397, Mar. 2011. https://doi.org/10.1016/j.comcom.2010.02.029
- A. Juels, "RFID security and privacy: a research survey", IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp.381-394, Feb. 2006. https://doi.org/10.1109/JSAC.2005.861395
- Hae-Soon Ahn , Ki-Dong Bu , Eun-Jun Yoon , In-Gil Nam, "Improved Authentication Protocol for RFID/USN Environment," Journal of the Institute of Electronics Enginners of Korea, 46(1), pp.1-10. 2009.
- Kim-Dae Jung, Jun Moon Seog, "Design of RFID Mutual Authentication Protocol using One Time Random Number", Journal of the Korea Information Science Society, 35(3), pp.243-250, Jun, 2008.
- JangYoung Chung, YoungSik Hong, "RFID Authentication Protocol Verification in Serverless Environment", Journal of the Korea Information Science Society, 35(1A), pp.140-145, Jun, 2008.
- JaeCheol Ha , JeaHoon Park , JungHoon Ha, HwanKoo Kim, SangJae Moon, "Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System", Journal of the Korea Institute of Information Security and Cryptology, 18(1), pp.77-87, Feb. 2008.
- Chia-Hui Wei, Min-Shiang Hwang, Chin, A.Y, "A Mutual Authentication Protocol for RFID". Computing & Processing, vol.13, pp. 20-24. IEEE Computer Society (2011)