1 S. A. Weis, "Security and privacy aspects of low-cost radio frequency identification systems" 2802 : 201-212, 2003
2 S. Yeo, "Scalable and flexible privacy protection scheme for RFID systems" 3813 : 153-163, 2005
3 P. Peris-Lopez, "RFID systems:a survey on security threats and proposed solutions" 4217 : 159-170, 2006
4 S. A. Sarma, "RFID systems and security and privacy implications" 2523 : 17-24, 2005
5 A. Juels, "RFID security and privacy: a research survey" 24 (24): 381-394, 2006
6 K. Finkenzeller, "RFID Handbook, second ed." Wiley & Sons 2002
7 김광조, "Mutual Authentication Protocol for Low-cost RFID" WRLC 17-24, 2005
8 EPCglobal, "Low level reader protocol (LLRP), Version 1.0.1"
9 I. Vajda, "Lightweight authentication protocols for low-cost RFID tags" 2003
10 T. Staake, "Extending the EPC network: the potential of RFID in anti-counterfeiting, In Auto-ID Labs White Paper" 2005
1 S. A. Weis, "Security and privacy aspects of low-cost radio frequency identification systems" 2802 : 201-212, 2003
2 S. Yeo, "Scalable and flexible privacy protection scheme for RFID systems" 3813 : 153-163, 2005
3 P. Peris-Lopez, "RFID systems:a survey on security threats and proposed solutions" 4217 : 159-170, 2006
4 S. A. Sarma, "RFID systems and security and privacy implications" 2523 : 17-24, 2005
5 A. Juels, "RFID security and privacy: a research survey" 24 (24): 381-394, 2006
6 K. Finkenzeller, "RFID Handbook, second ed." Wiley & Sons 2002
7 김광조, "Mutual Authentication Protocol for Low-cost RFID" WRLC 17-24, 2005
8 EPCglobal, "Low level reader protocol (LLRP), Version 1.0.1"
9 I. Vajda, "Lightweight authentication protocols for low-cost RFID tags" 2003
10 T. Staake, "Extending the EPC network: the potential of RFID in anti-counterfeiting, In Auto-ID Labs White Paper" 2005
11 EPCglobal, "EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz, Version 1.2.0 Specification for RFID Air Interface" EPCglobal 2008
12 M. Ohkubo, "Cryptographic approach to privacy-friendly tag" 2003
13 J. S. Cho, "Consideration on the brute-force attack cost and retrieval cost:A hash-based radio-frequency identification (RFID) tag mutual authentication protocol" 2012
14 A. Mitrokotsa, "Classification of RFID attacks" 2008
15 M. Feldhofer, "An authentication protocol in a security layer for RFID smart tags" 2 : 759-762, 2004
16 M. Langheinrich, "A survey of RFID privacy approaches" 58-64, 2008