参考文献/References:
[1] Osaka K,Takagi T,Yamazaki K,et al. An efficient and secure RFID security method with ownership transfer[J]. Computational Intelligence and Security,2006,2:1 090-1 091.
[2]Thayer Fabrega F W,Herzog J C,Guttman J D. Strand space:providing security protocols correct[J]. J Compute Security,1999,7:191-230.
[3]Burrows M,Abadi M,Needham R. A logic of authentication[J]. ACM Transactions on Computer,1990,8(1):18-36.
[4]Yiqi G,Jie Z,Hwangkye C. An improved RFID Security method with ownership transfer[C]//Proceedings of ICTC. Seoul,Korea,2011:594-596.
[5]Chen H B,Lee W B,Zhao Y H,et al. Enhancement of the RFID security method with ownership transfer[C]//Proc Int Conf Ubiquitous Inform Manage. Communication,Suwan,Korea,2009:251-254.
[6]Lei H,Cao T. RFID protocol enabling ownership transfer to protect against traceability and DoS attacks[C]//Proc 1st Int Symp Data,Privacy E-Commerce. Chengdu,2007:508-510.
[7]Jappinen P,Hamalainen H. Enhanced RFID security method with ownership transfer[J]. International Conference on Computational Intelligence and Security,2008,2(13-17):382-385.
[8]Eunjun Y,Keeyoung Y. Two security problems of RFID security method with ownership transfer[C]//Proc IFIP Int Conf Netw. Parallel Compute,Shanghai,2008:68-73.
[9]Song B,Mitchell J. Scalable RFID security protocols supporting tag ownership transfer[J]. Computer Communications,2011,34(4):556-566.
[10]张兵,马新新,秦志光. Hash运算的RFID认证协议分析和改进[J]. 计算机应用研究,2011,28(11):4 311-4 314.
Zhang Bing,Ma Xinxin,Qin Zhiguang. Analysis and improvement of hash-based RFID authentication protocol[J]. Application Research of Computers,2011,28(11):4311-4314.(in Chinese)