Lo N W,Yeh K H.Anonymous coexistence proofs for RFID tags[J].Journal of Information Science and Engineering,2010,26(4):1213-1230.
[2]
张忠,徐秋亮.物联网环境下UC安全的组证明RFID协议[J].计算机学报,2011,34(7):1188-1194. Zhang Zhong,et al.Universal composable grouping-proof protocol for RFID tags in the Internet of Things[J].Chinese Journal of Computers,2011,34(7):1188-1194.(in Chinese)
[3]
Duc D N,et al.A survey on RFID security and provably secure grouping-proof protocols[J].International Journal of Internet Technology and Secured Transactions,2010,2(3):222-249.
[4]
Peris-Lopez P,et al.Flaws on RFID grouping-proofs.Guidelines for future sound protocols[J].Journal of Network and Computer Applications,2011,34(3):833-845.
[5]
Liu H,et al.Grouping-proofs-based authentication protocol for distributed RFID systems[J].IEEE Transactions on parallel and distributed systems,2013,24(7):1321-1330.
[6]
Ko W T,Chiou S Y,Lu E H,et al.A privacy-preserving grouping proof protocol based on ECC with untraceability for RFID[J].Applied Mathematics,2012,3(4):336-341.
[7]
马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398. Ma Changshe.Low cost RFID authentication protocol with forward privacy[J].Chinese Journal of Computers,2011,34(8):1387-1398.(in Chinese)
[8]
Alomair B,Clark A,Cuellar J,et al.Scalable RFID systems:a privacy-preserving protocol with constant-time identification[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(8):1536-1550.