4Sanjay E. Sarma, Stephen A. Weis, Daniel W. Engels. RFID Systems andSecurityandPrivacy Implications. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems[C] (CHE 2002).
5Stephen A. Weis, Sanjay E. Sarma, Rivest R.L., Daniel W. Engels. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems. Proceeding of the 1st Intermational Conference on Security in Pervasive Computing[C].2003.
6Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita. Hash-chain based Forward-Secure Privacy Protection Scheme for Low-cost RFID. Proceedings of Information Security the 2004 Symposium on Cryptography and [C]. (SCIS 2004).
7Lee SW,Kmhs,Yoo K Y.Efficient nonce-based remote user authentication scheme using smart cards.Applied Mathematics and Computation,2005,167 (1):335-361.
8Burrows M,Abadi M,Needham R.A logic of authentication.ACM Transactions on Computer Systems,1990,8(1):18-36.