5EPCglobal Inc.. EPCTM Radio-Frequency ldentity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.2.0[S]. 2008.
3HEN Chun-te,LEE Kun-lin,WU Y C,et al.Construction of theenterprise-level RFID security and privacy management usingrole-based key management[C].Proc of IEEE International Con-ference on Systems, Man, and Cybemetics,2006:3310-3317.
4PARK N,LEE J,KIM H,et al.A layered approach to design oflightweight middleware systems for mobile RFID security[C].Proc of the 10th IEEE/IFIP Network Operations and Manage-ment Symposium,2006:1-6.
5TOIRUUL B,LEE K.An advanced mutual-authentication al-gorithm using AES for RFID systems[J]. International Jour-nal of Computer Science and Network Security, 2006,6 (9):156-162.
6GAO Xing-xin,XIANG Zhe,WANG Hao,et al.An approach tosecurity and privacy of RFID system for supply chain[C].Proc ofthe IEEE International Conference on E-commerce Technologyfor Dynamic E-Business. Washington DC: IEEE Computer So-ciety,2004:164-168.