Reference: | [1] R. Bassil, W. El-Beaino, W. Itani, A. Kayssi, and A. Chehab. "PUMAP: A PUF-based ultra-lightweight mutual-authentication RFID protocol. " International Journal of RFID Security and Cryptography, 1(1), March (2012) [2] H. Chien. "SASI: A New Ultralight weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity." IEEE Transactions on Dependable and Secure Computing 4(4)Oct.-Dec. (2007) [3] T.Cao, E. Bertino, and H. Lei.“Security Analysis of the SASI Protocol”.IEEE Transactions on Dependable and Secure Computing (2008). [4] S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, "Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications,” in Proc. IEEE International Conference on RFID, April (2008). [5] A. Eghdamian and A. Samsudin. "A secure protocol for ultralightweight radio frequency identication (RFID) tags. " In Informatics Engineering and Infor-mation Science ICIEIS 2011, volume 251 of Communications in Computer and Information Science , Kuala Lumpur, Malaysia, Springer. November (2011) [6] EPCglobal, http://www.epcglobalinc.org/, 2007. [7] G. Y. Jin, X. Y. Lu, M. S. Park. "An Indoor Localization Mechanism Using Active RFID Tag. " In SUTC, (2006) [8] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador, and A. Ribagorda. "M2AP: a minimalist mutual-authentication protocol for lowcost RFID Tags. "inProc.International Conference on Ubiquitous Intelligence and Computing (2006) [9] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador,A. Ribagorda."LMAP: a real lightweight mutual authentication protocol for low-cost RFID Tags." in Proc. Workshop RFID Security.(2006) [10] P. P. Lopez, J. C. H. Castro, J. M. Estevez-Tapiador, and A. Ribagorda. "EMAP: An efficient mutual authentication protocol for low-cost RFID Tags. " Springer-Verlag,In Proc. of IS`06, volume 4277 of LNCS.(2006) [11] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador,A. Ribagorda. "Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol", In Workshop on Information Security Applications, Volume 5379 of LNCS, (2008) [12] T. Li and G. Wang. "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols", Proc. 22nd IFIP TC-11 Int’1Information Security Conference.(2007) [13] Y. Lee. "Two ultralightweight authentication protocols for low-cost RFID tags. "Applied Mathematics and Information Sciences, 6(2S) May (2012) [14] L. M. Ni, Y.H. Liu, Y.C. Lau, A.P. Patil. "LANDMARC: Indoor location sensing using active RFID: Pervasive computing and communications", Wireless Networks, 10 (6). (2004) [15] M. Ohkubo, K. Suzuki, and S. Kinoshita. "Cryptographic Approach to Privacy-Friendly Tags" RFID Privacy Workshop,November (2003) [16] M. Safkhani, N. Bagheri, M. Naderi, "Security Analysis of a PUF based RFID Authentication Protocol" 704 Cryptology ePrintArchive:Listing for 2011 [17] I. Vajda and L. Butty´an, “Lightweight authentication protocols for low-cost RFID Tags,” 2nd Workshop on Security in Ubiquitous Computing (2003) [18] Y. Zhao, Y. Liu, L.M. Ni, "VIRE: active RFID-based localization using virtual reference elimination, " in Proceedings of the 2007 International Conference on Parallel Processing, IEEE, Piscataway, NJ, USA (2007) [19] Y. Zhang, P. kitsos. "Security in RFID and Sensor Networks" Auerbach Publications (2009) |