메뉴 건너뛰기




Volumn , Issue , 2005, Pages 31-34

Privacy for RFID through trusted computing

Author keywords

Audit; Privacy; RFID; Trusted Computing

Indexed keywords

COMPUTER HARDWARE; COSTS; DATA PRIVACY; INFORMATION MANAGEMENT; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33749013010     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102199.1102206     Document Type: Conference Paper
Times cited : (31)

References (18)
  • 1
    • 0002187137 scopus 로고
    • Wallets databases with observers
    • D. Chaum and T. Pedersen. Wallets databases with observers. In CRYPTO 1992, 1992.
    • (1992) CRYPTO 1992
    • Chaum, D.1    Pedersen, T.2
  • 2
    • 24644498798 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In CHES, 2004.
    • (2004) CHES
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 3
    • 26444442422 scopus 로고    scopus 로고
    • Scanning with a purpose - Supporting the fair information principles in RFID protocols
    • Hitomi Murakami, Hideyuki Nakashima, Hideyuki Tokuda, and Michiaki Yasumura, editors, Ubiquitious Computing Systems. Revised Selected Papers from the 2nd International Symposium on Ubiquitous Computing Systems (UCS 2004), November 8-9, 2004, Tokyo, Japan, Berlin, Germany, June. Springer-Verlag
    • Christian Floerkemeier, Roland Schneider, and Marc Langheinrich. Scanning with a purpose - supporting the fair information principles in RFID protocols. In Hitomi Murakami, Hideyuki Nakashima, Hideyuki Tokuda, and Michiaki Yasumura, editors, Ubiquitious Computing Systems. Revised Selected Papers from the 2nd International Symposium on Ubiquitous Computing Systems (UCS 2004), November 8-9, 2004, Tokyo, Japan, volume 3598 of Lecture Notes in Computer Science, Berlin, Germany, June 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3598
    • Floerkemeier, C.1    Schneider, R.2    Langheinrich, M.3
  • 4
    • 78650880166 scopus 로고    scopus 로고
    • Flexible OS support and applications for trusted computing
    • T. Garfinkel, M. Rosenblum, and D. Boneh. Flexible OS support and applications for trusted computing. In HotOS-IX, 2003.
    • (2003) HotOS-IX
    • Garfinkel, T.1    Rosenblum, M.2    Boneh, D.3
  • 7
    • 84859287213 scopus 로고    scopus 로고
    • IBM. IBM Trusted Linux, 2005. http://www.research.ibm.com/gsal/tcpa/.
    • (2005) IBM Trusted Linux
  • 8
    • 84859287234 scopus 로고    scopus 로고
    • Ari Juels. A bit of privacy, 2005. http://www.rfidjournal.com/article/ articleview/1536/1/133/.
    • (2005) A Bit of Privacy
    • Juels, A.1
  • 9
    • 20444478767 scopus 로고    scopus 로고
    • Soft blocking: Flexible blocker tags on the cheap
    • Ari Juels and J. Brainard. Soft blocking: Flexible blocker tags on the cheap. In WPES 2004, 2004.
    • (2004) WPES 2004
    • Juels, A.1    Brainard, J.2
  • 14
    • 33748987979 scopus 로고    scopus 로고
    • Integrity validation infrastructure for RFID edge controllers
    • In Japanese
    • M. Nakamura, T. Mishina, and S. Munetoh. Integrity validation infrastructure for RFID edge controllers. In SCIS2005, 2005. In Japanese.
    • (2005) SCIS2005
    • Nakamura, M.1    Mishina, T.2    Munetoh, S.3
  • 18
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doom. Design and implementation of a TCG-based integrity measurement architecture. In Usenix Security, 2004.
    • (2004) Usenix Security
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doom, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.