메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 293-308

Authenticating pervasive devices with human protocols

Author keywords

Authentication; HumanAut; Learning Parity with Noise (LPN); Pervasive computing; RFID

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTER SCIENCE; COMPUTER SIMULATION; CRYPTOGRAPHY; NETWORK PROTOCOLS; PROBLEM SOLVING; RADIO FREQUENCY AMPLIFIERS; SECURITY OF DATA;

EID: 33745181952     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (479)

References (39)
  • 1
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • International Workshop on Security Protocols
    • ANDERSON, R., AND KUHN, M. Low Cost Attacks on Tamper Resistant Devices. In International Workshop on Security Protocols (1997), vol. 1361 of Lecture Notes in Computer Science, pp. 125-136.
    • (1997) Lecture Notes in Computer Science , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 3
    • 84877639283 scopus 로고    scopus 로고
    • Cryptographic primitives based on hard learning problems
    • Advances in Cryptology - CRYPTO'93 (1994)
    • BLUM, A., FURST, M., KEARNS, M., AND LIPTON, R. J. Cryptographic Primitives Based on Hard Learning Problems. In Advances in Cryptology - CRYPTO'93 (1994), vol. 773 of Lecture Notes in Computer Science, pp. 278-291.
    • Lecture Notes in Computer Science , vol.773 , pp. 278-291
    • Blum, A.1    Furst, M.2    Kearns, M.3    Lipton, R.J.4
  • 4
    • 24144453496 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • July
    • BLUM, A., KALAI, A., AND WASSERMAN, H. Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model. Journal of the ACM 50, 4 (July 2003), 506-519.
    • (2003) Journal of the ACM , vol.50 , Issue.4 , pp. 506-519
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 5
    • 0025022876 scopus 로고
    • Self-testing/correcting with applications to numerical problems
    • BLUM, M., LUBY, M., AND RUBINFELD, R. Self-Testing/Correcting with Applications to Numerical Problems. In Symposium on Theory of Computation (1990), pp. 73-83.
    • (1990) Symposium on Theory of Computation , pp. 73-83
    • Blum, M.1    Luby, M.2    Rubinfeld, R.3
  • 6
    • 84877887414 scopus 로고    scopus 로고
    • Security analysis of a cryptographically-enabled RFID device
    • To appear
    • BONO, S., GREEN, M., STUBBLEFIELD, A., JUELS, A., RUBIN, A., AND SZYDLO, M. Security Analysis of a Cryptographically-Enabled RFID Device. In USENIX Security (2005). To appear. Available at http://rfidanalysis.org/.
    • (2005) USENIX Security
    • Bono, S.1    Green, M.2    Stubblefield, A.3    Juels, A.4    Rubin, A.5    Szydlo, M.6
  • 7
    • 84948963042 scopus 로고
    • On the security of some cryptosystems based on error-correcting codes
    • Advances in Cryptology - EUROCRYPT
    • CHABAUD, F. On the Security of Some Cryptosystems Based on Error-Correcting Codes. In Advances in Cryptology - EUROCRYPT (1995), vol. 950 of Lecture Notes in Computer Science, pp. 131-139.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 131-139
    • Chabaud, F.1
  • 8
    • 84929461941 scopus 로고    scopus 로고
    • How to achieve a McEliece-based digital signature scheme
    • Advances in Cryptology - ASIACRYPT
    • COURTOIS, N., FINIASZ, M., AND SENDRIER, N. How to Achieve a McEliece-based Digital Signature Scheme. In Advances in Cryptology - ASIACRYPT (2001), vol. 2248 of Lecture Notes in Computer Science, pp. 157-174.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 157-174
    • Courtois, N.1    Finiasz, M.2    Sendrier, N.3
  • 9
    • 0042851681 scopus 로고
    • The minimal disagreement parity problem as a hard satisfiability problem
    • Computational Intelligence Research Laboratory and AT&T Bell Labs, February
    • CRAWFORD, J. M., KEARNS, M. J., AND SHAPIRE, R. E. The Minimal Disagreement Parity Problem as a Hard Satisfiability Problem. Tech. rep., Computational Intelligence Research Laboratory and AT&T Bell Labs, February 1994.
    • (1994) Tech. Rep.
    • Crawford, J.M.1    Kearns, M.J.2    Shapire, R.E.3
  • 10
    • 33745134577 scopus 로고    scopus 로고
    • EPCGLOBAL. Website. http://www.epcglobalinc.org/, 2005.
    • (2005)
  • 12
    • 35048881133 scopus 로고    scopus 로고
    • Issues with RFID usage in ubiquitous computing applications
    • Pervasive Computing (PERVASIVE)
    • FLOERKEMEIER, C., AND LAMPE, M. Issues with RFID Usage in Ubiquitous Computing Applications. In Pervasive Computing (PERVASIVE) (2004), vol. 3001 of Lecture Notes in Computer Science, pp. 188-193.
    • (2004) Lecture Notes in Computer Science , vol.3001 , pp. 188-193
    • Floerkemeier, C.1    Lampe, M.2
  • 13
    • 21744453249 scopus 로고    scopus 로고
    • Combating counterfeit drugs
    • US Department of Health and Human Services, Rockville, Maryland, Februrary
    • FOOD AND DRUG ADMINISTRATION. Combating counterfeit drugs. Tech. rep., US Department of Health and Human Services, Rockville, Maryland, Februrary 2004.
    • (2004) Tech. Rep.
  • 14
  • 15
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • IEEE Computer Society
    • HENRICI, D., AND MÜLLER, P. Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In Pervasive Computing and Communications (PerCom) (2004), IEEE Computer Society, pp. 149-153.
    • (2004) Pervasive Computing and Communications (PerCom) , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 16
    • 14844324416 scopus 로고    scopus 로고
    • A secure human-computer authentication scheme
    • Carnegie Mellon University
    • HOPPER, N., AND BLUM, M. A Secure Human-Computer Authentication Scheme. Tech. Rep. CMU-CS-00-139, Carnegie Mellon University, 2000.
    • (2000) Tech. Rep. , vol.CMU-CS-00-139
    • Hopper, N.1    Blum, M.2
  • 17
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Advances in Cryptology - ASIA CRYPT (2001)
    • HOPPER, N. J., AND BLUM, M. Secure Human Identification Protocols. In Advances in Cryptology - ASIA CRYPT (2001), vol. 2248 of Lecture Notes in Computer Science, pp. 52-66.
    • Lecture Notes in Computer Science , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 18
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for RFID tags
    • Security in Communication Networks C. Blundo and S. Cimato, Eds., Springer-Verlag
    • JUELS, A. Minimalist Cryptography for RFID Tags. In Security in Communication Networks (2004), C. Blundo and S. Cimato, Eds., vol. 3352 of Lecture Notes in Computer Science, Springer-Verlag, pp. 149-164.
    • (2004) Lecture Notes in Computer Science , vol.3352 , pp. 149-164
    • Juels, A.1
  • 20
    • 35248832722 scopus 로고    scopus 로고
    • Squealing euros: Privacy protection in RFID-enabled banknotes
    • Financial Cryptography
    • JUELS, A., AND PAPPU, R. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In Financial Cryptography (2003), vol. 2742 of Lecture Notes in Computer Science, pp. 103-121.
    • (2003) Lecture Notes in Computer Science , vol.2742 , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 22
    • 0032202014 scopus 로고    scopus 로고
    • Efficient noise-tolerant learning from statistical queries
    • November
    • KEARNS, M. Efficient Noise-Tolerant Learning from Statistical Queries. Journal of the ACM 45, 6 (November 1998), 983-1006.
    • (1998) Journal of the ACM , vol.45 , Issue.6 , pp. 983-1006
    • Kearns, M.1
  • 24
    • 33745119673 scopus 로고    scopus 로고
    • MIT proximity card vulnerabilities
    • Massachusetts Institute of Technology, March
    • MANDEL, J., ROACH, A., AND WINSTEIN, K. MIT Proximity Card Vulnerabilities. Tech. rep., Massachusetts Institute of Technology, March 2004.
    • (2004) Tech. Rep.
    • Mandel, J.1    Roach, A.2    Winstein, K.3
  • 25
    • 0029712968 scopus 로고    scopus 로고
    • Human-computer cryptography: An attempt
    • ACM Press
    • MATSUMOTO, T. Human-computer Cryptography: An Attempt. In Computer and Communications Security (1996), ACM Press, pp. 68-75.
    • (1996) Computer and Communications Security , pp. 68-75
    • Matsumoto, T.1
  • 26
    • 84995399871 scopus 로고    scopus 로고
    • Human identification through insecure channel
    • Advances in Cryptology - EUROCRYPT (1991)
    • MATSUMOTO, T., AND IMAI, H. Human Identification through Insecure Channel. In Advances in Cryptology - EUROCRYPT (1991), vol. 547 of Lecture Notes in Computer Science, pp. 409-421.
    • Lecture Notes in Computer Science , vol.547 , pp. 409-421
    • Matsumoto, T.1    Imai, H.2
  • 28
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • MILLER, G. A. The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information. Psychological Review 63 (1956), 81-97.
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 29
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • B. Pfitzmann and P. McDaniel, Eds., ACM
    • MOLNAR, D., AND WAGNER, D. Privacy and Security in Library RFID : Issues, Practices, and Architectures. In Computer and Communications Security (2004), B. Pfitzmann and P. McDaniel, Eds., ACM, pp. 210-219.
    • (2004) Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 30
    • 84958648410 scopus 로고    scopus 로고
    • Visual authentication and identification
    • Advances in Cryptology - CRYPTO (1997)
    • NAOR, M., AND PINKAS, B. Visual Authentication and Identification. In Advances in Cryptology - CRYPTO (1997), vol. 1294 of Lecture Notes in Computer Science, pp. 322-336.
    • Lecture Notes in Computer Science , vol.1294 , pp. 322-336
    • Naor, M.1    Pinkas, B.2
  • 31
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • NIEDERREITER, H. Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory 15, 1 (1986), 159-166.
    • (1986) Problems of Control and Information Theory , vol.15 , Issue.1 , pp. 159-166
    • Niederreiter, H.1
  • 33
  • 35
    • 0030283873 scopus 로고    scopus 로고
    • A new paradigm for public key identification
    • STERN, J. A New Paradigm for Public Key Identification. IEEE Transactions on Information Theory 42, 6 (1996), 1757-1768.
    • (1996) IEEE Transactions on Information Theory , vol.42 , Issue.6 , pp. 1757-1768
    • Stern, J.1
  • 37
    • 33745135628 scopus 로고    scopus 로고
    • VERICHIP. Website. http://www.4verichip.com/, 2005.
    • (2005)
  • 38
    • 84957372142 scopus 로고
    • On the matsumoto and Imai's Human identification scheme
    • EuroCrypt'95
    • WANG, C.-H., HWANG, T., AND TSAI, J.-J. On the Matsumoto and Imai's Human Identification Scheme. In EuroCrypt '95 (1995), vol. 921 of Lecture Notes in Computer Science, pp. 382-392.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 382-392
    • Wang, C.-H.1    Hwang, T.2    Tsai, J.-J.3
  • 39
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Security in Pervasive Computing
    • WEIS, S. A., SARMA, S. E., RIVEST, R. L., AND ENGELS, D. W. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing (2004), vol. 2802 of Lecture Notes in Computer Science, pp. 201-212.
    • (2004) Lecture Notes in Computer Science , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.