5ZHANG Lan, ZHOU Huai-bei, KONG Ruo-shan. An Improved Approach to Security and Privacy of RFID Application System [C]. Wuhan: Networking and Mobile Computing Conference. 2005 : 1195- 1198.
6WEISS A, SARMA S E, RIVEST R L, et al. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems [C]. Berlin: Proceedings of the 1st International Conference on Security in Pervasive Computing,2004:201-212.
7OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID [C]. Sendai:Proceedings of the 2004 Symposium on Cryptography and Information Security, 2004: 719- 724.
8RHEE K, KWAK J, KIM S, et al. Challenge Response Based RFID Authentication Protocol for Distributed Database Environment[C]. Berlin~ Proceedings of the 2nd International Conference on Security in Pervasive Computing. 2005:70-84.
9Ohkubo, Suzuki K, Kinoshita S. RFID privacy issues and technical challenges. Communications of the ACM, 2005, 48(9): 66-71.
10Sarma S, Weis S A, Engels D W. RFID systems security and privacy implications. In:Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES2002), Berlin,Springer-Verlag, 2003.