1. Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things[J];Han;Wireless Pers. Commun.,2017
2. Pan, Y., Shan, Z., Dai, Q., et al.: CPK-ECC based mutual authentication protocol for large-scale RFID system[J].Journal on Communications,2017,38(08):165–171
3. Tuyls, P., Batina, L.. RFID-tags for anti-counterfeiting[C]//Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February: 13–17, Proceedings. Springer Berlin Heidelberg, 2006: 115–131. (2005)
4. Zhang, X., Li, L., Wu, Y., et al.: An ECDLP-based randomized key RFID authentication protocol[C]//2011 international conference on network computing and information security. IEEE, 2: 146–149. (2011)
5. Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme using hybrid protocols[C]// Advances in Intelligent Systems and Applications-Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012. springer Berlin Heidelberg, : 1–13. (2013)