References
- A. Jules, R. L. Rivest, and M. Szydlo " Selective Blocking of RFID Tags for Consumer Privacy", In Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp.103-111, 2003
- H. Gillbert, M. Robshaw, H. Sibent, "Active attack against HB+: a probably secure lightweight authentication protocol", Electronics Letters, 13th October, vol. 41, No. 25, 2005.
- S. L. Garfinkel, A. Jules and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions", IEEE Security and Privacy, vol. 3, pp.34-43, May/June 2005.
- Hyoyoung Shin, Kyedong Jung, Chigon Hwang, "A Study on the effectiveness of matrix-based authentication protocol", The 3rd International conference of convergence technology 2013, July 3-6, 2013.
- R. Chandramouli, T. Grance, R. Kuhn, "Security Standards for the RFID Market ", IEEE Security & Privacy, Dec. 2005.
- Christian Flockermeier, Sanjay Samara, "An Overview of RFID System Interfaces and Reader Protocols", 2008 IEEE International Conference on RFID, pp.232-pp.240, April, 2008
- Su Youn Lee, Hyo Beom Ahn, "A Study on Secure Matrix-based RFID Authentication Protocol", Journal of information and security. Vol. 6, No.1, pp.83-90, 2006.
- Eun-Jun Yoon, Kyeoung-Ju Ha, Kee-Young Yoo, "Robust Matrix-based RFID Mutual Authentication Protocol", The Journal Of Korea Information And Communications Society, Vol. 33, No. 11, 2008.
- Ik-Su Kim, "Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System", The Journal Of Korea Information And Communications Society, Vol. 34, No. 4, pp.428-434, 2009.
- Eun Young Choi, Dong Hee Choi, Jong In Lim, Dong Hoon Lee, "Efficient authenticate protocol for very Low-Cost RFID", Journal of the Korea Institute of Information Security and Cryptology, Vol. 15, No. 5, 2005.