1Alfaro,J G,Barbeau,M,Kranakis E.Security threats on EPCbased RFID systems[C]//5th International Conference onInfor-mation Technology:New Generations.InformationSecurity and Privacy track,IEEE Computer Society,2008.
2Kaminsky,D.Explorations in Namespace:White-hat Hackinga cross the Doma in Name System.Commun[J].ACM,2006,49(6):62-69.
6Sarma S, Weis S, Engels D. White paper: RFID systems, security and privacy implications. Auto-ID Center, MIT:Technical Report MIT-AUTOID-WH-014, 2002
7Juels A, Weis S A. Defining strong privacy for rfid//Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'07). Washington, DC, USA, 2007:342-347
8Burmester M, Le T, Medeiros B. Provably secure ubiquitous systems: Universally composable RFID authentication protocols//Proceedings of the Conference on Security and Privacy in Communication Networks (SECURECOMM). Baltimore, Maryland, USA, 2006:1-9
9Li Y, Ding X. Protecting rfid communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security ( ASIACCS' 07). Singapore, 2007:234-241
10Sarma S, Weis S, Engels D. Radio-frequency identification systems//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems. San Francisco, USA, 2002:454 -469