6WEISS A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems[C]. HUTrER D, MULLER G, STEPHAN W, ULLMANN M. eds. Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science 2802. Berlin: Springer2Verlag, 2004:201-212.
7OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based forward-secure privacy protection scheme for lowcost RFID[C]. Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004),Sendai 2004:719-724.
8ISRASENA P. Securing ubiquitous and low 2cost RFID using tiny encryption algorithm[C]. Wireless Pervasive Computing, 2006. 1st International Symposium, 16215 Jan 2006, 124.
9SARMA S E, WEOS S A, ENGELS D W. RFID systems and security and privacy implications[C]. KALISKR B. S., KOC C K, PAAR C. eds. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002). Lectures Notes in Computer Science 2523. Ber21in: Springer2Verlag, 2003:454-469.
10SARMA S E,WEIS S A,ENGELS D W. Radio frequency identification: Secure risks and challenges[R]. RSA Laboratories Cryptobytes, 2003,6(1):2-9.