参考文献/References:
[1] Atzori L, Iera A, Morabito G. The internet of things: a survey [J]. Computer Netwworks, 2010, 54(15): 2787-2805.
[2] Lee H J, Kim J Y. Privacy threats and issues in mobile RFID [C]// Proceedings of the First International Conference on Availability, Reliability and Security. Los Alamitos(USA): IEEE Press, 2006:510-514.
[3] Juels A. RFID security and privacy: a research survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2):381-394.
[4] Alomair B, Poovendran R. Privacy versus scalability in radio frequency identification systems [J]. Computer Communication, 2010, 33(18): 2155-2163.
[5] Sadeghi A R, Visconti I, Wachsmann C. Location privacy in RFID applications [C]// The 1st International Workshop on Privacy in Location-based Applications. Berlin: Springer-Verlag, 2009: 127-150.
[6] Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C]// The 2nd international Conference on Security in Pervasive Computing. Berlin: Springer-Verlag, 2005:70-84.
[7] Chen C L, Jan J K,Chie C F. Based on mobile RFID device to design a secure mutual authentication scheme for market application [C]// International Conference on Broadband, Wireless Computing, Communication and Applications. Los Alamitos(USA): IEEE Computer Society, 2010: 423-428.
[8] Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers [C]// The 2nd IEEE Annual Conference on Pervasive Computing and Communications. Los Alamitos(USA): IEEE Computer Society, 2004: 149-153.
[9] He L, Gan Y, Li N N, et al. A Security- provable authentication and key agreement protocol in RFID system [C]// The 3rd International Conference on Wireless Communications, Networking and Mobile Computing. New York: IEEE Press, 2007: 2078-2080.
[10] Zhou S J, Zhang Z, LUO Z W, et al. A lightweight anti-desynchronization RFID authentication protocol [J]. Information System Frontiers, 2010, 12(5): 521-528.
[11] Park N, Won D. Dynamic privacy protection for mobile RFID service [C]// RFID Security: Techniques, Protocols and System-on-Chip Design. Berlin: Springer-Verlag, 2009: 229-254.
[12] Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C]// IEEE Computer Society Symposium on Research in Security and Privacy. Los Alamitos(USA): IEEE Computer Society, 1990: 234-248.
[13] Wu K J, Bai E J, Zhang W. A hash-based authentication protocol for secure mobile RFID systems [C]// The 1st International Conference on Information Science and Engineering. Piscataway(USA): IEEE Press, 2009:2440-2443.
相似文献/References:
[1]梁正平,纪震,林佳利,等.基于三维编码的全流程食品追溯系统[J].深圳大学学报理工版,2010,27(3):312.
LIANG Zheng-ping,JI Zhen,LIN Jia-li,et al.A whole course food tracing system based on three dimensional code[J].Journal of Shenzhen University Science and Engineering,2010,27(No.2(095-188)):312.
[2]闫巧,宁土文.基于矩阵边采样的IP追踪[J].深圳大学学报理工版,2012,29(No.5(377-470)):399.[doi:10.3724/SP.J.1249.2012.05399]
YAN Qiao and NING Tu-wen.IP traceback with matrix edge sampling[J].Journal of Shenzhen University Science and Engineering,2012,29(No.2(095-188)):399.[doi:10.3724/SP.J.1249.2012.05399]
[3]田传俊.频率不相关性及其在单钥密码系统中的应用[J].深圳大学学报理工版,2015,32(1):32.[doi:10.3724/SP.J.1249.2015.01032]
Tian Chuanjun.Frequency irrelevance and its applications in one-key cryptosystems[J].Journal of Shenzhen University Science and Engineering,2015,32(No.2(095-188)):32.[doi:10.3724/SP.J.1249.2015.01032]
[4]陈国良,毛睿,蔡晔.高性能计算及其相关新兴技术[J].深圳大学学报理工版,2015,32(1):25.[doi:10.3724/SP.J.1249.2015.01025]
Chen Guoliang,Mao Rui,and Cai Ye.High performance computing and related new technologies[J].Journal of Shenzhen University Science and Engineering,2015,32(No.2(095-188)):25.[doi:10.3724/SP.J.1249.2015.01025]
[5]郭文杰,张应辉,郑东.云存储中支持词频和用户喜好的密文模糊检索[J].深圳大学学报理工版,2015,32(5):532.[doi:10.3724/SP.J.1249.2015.05532]
Guo Wenjie,Zhang Yinghui,et al.Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage[J].Journal of Shenzhen University Science and Engineering,2015,32(No.2(095-188)):532.[doi:10.3724/SP.J.1249.2015.05532]
[6]刘朝斌,孙雪,刘剑,等.基于物联网的高校校园智能安防建设探索[J].深圳大学学报理工版,2020,37(增刊1):128.[doi:10.3724/SP.J.1249.2020.99128]
LIU Chaobin,SUN Xue,LIU Jian,et al.Campus intelligent security construction based on internet of things[J].Journal of Shenzhen University Science and Engineering,2020,37(No.2(095-188)):128.[doi:10.3724/SP.J.1249.2020.99128]
[7]李子木,陆川,王继龙,等.基于IoT+GIS技术的校园弱电管网智能监控管理系统设计和应用[J].深圳大学学报理工版,2020,37(增刊1):155.[doi:10.3724/SP.J.1249.2020.99155]
LI Zimu,LU Chuan,WANG Jilong,et al.Design and application of intelligent monitoring and management system for campus weak current pipeline network based on IoT+GIS technology[J].Journal of Shenzhen University Science and Engineering,2020,37(No.2(095-188)):155.[doi:10.3724/SP.J.1249.2020.99155]