메뉴 건너뛰기




Volumn 4097 LNCS, Issue , 2006, Pages 252-261

A scalable and untraceable authentication protocol for RFID

Author keywords

[No Author keywords available]

Indexed keywords

BAR CODES; COMPUTER SOFTWARE; COPYRIGHTS; DATA PRIVACY; DATA TRANSFER; IDENTIFICATION (CONTROL SYSTEMS); SECURITY OF DATA; USER INTERFACES; AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; EMBEDDED SYSTEMS; INTELLIGENT BUILDINGS; MULTIMEDIA SERVICES; NETWORK SECURITY; RADIO FREQUENCY IDENTIFICATION (RFID); SCALABILITY; SENSOR NETWORKS; SOFTWARE RELIABILITY;

EID: 33749406338     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11807964_26     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 1
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • C. Blundo and S. Cimato, editors, Sep. Springer-Verlag, Amalfi, Italia
    • Ari Juels, "Minimalist Cryptography for Low-cost RFID Tags", In C. Blundo and S. Cimato, editors, The Fourth International Conference on Security in Communication Networks - SCN 2004, LNCS 3352, pp.149-164, Sep. 2004, Springer-Verlag, Amalfi, Italia.
    • (2004) The Fourth International Conference on Security in Communication Networks - SCN 2004, LNCS , vol.3352 , pp. 149-164
    • Juels, A.1
  • 2
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • Mar. IEEE Computer Society, Orlando, Florida, USA
    • Dirk Henrici and Paul Müller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pp.149-153, Mar. 2004, IEEE Computer Society, Orlando, Florida, USA.
    • (2004) International Workshop on Pervasive Computing and Communication Security - PerSec 2004 , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 5
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Apr. Springer-Verlag, Boppard, Germany
    • Keunwoo Rhee, Jin Kwak, Seungjoo Kim and Dongho Won, "Challenge- Response based RFID Authentication Protocol for Distributed Database Environment", International Conference on Security in Pervasive Computing - SPC 2005, LNCS 3450, pp.70-84, Apr. 2005, Springer-Verlag, Boppard, Germany.
    • (2005) International Conference on Security in Pervasive Computing - SPC 2005, LNCS , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 6
    • 33645857377 scopus 로고    scopus 로고
    • Cryptography and authentication on RFID passive tags for apparel products
    • Nov. 2006, Elsevier Science, Article In press
    • Kirk Wong, Patrick Hui and Allan Chan, "Cryptography and Authentication on RFID Passive Tags for Apparel Products", Computers in Industry, Nov. 2006, Elsevier Science, Article In press.
    • Computers in Industry
    • Wong, K.1    Hui, P.2    Chan, A.3
  • 8
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
    • Aug. Springer-Verlag, Kingston, Canada
    • David Molnar, Andrea Soppera and David Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags", Selected Areas in Cryptography - SAC 2005, LNCS 3897, pp.276-290, Aug. 2005, Springer-Verlag, Kingston, Canada.
    • (2005) Selected Areas in Cryptography - SAC 2005, LNCS , vol.3897 , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 9
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to privacy-friendly tags
    • MIT, USA
    • Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, "Cryptographic Approach to Privacy-friendly Tags", In RFID Privacy Workshop, 2003, MIT, USA.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 11
    • 84928570349 scopus 로고    scopus 로고
    • Global supply chain GTIN & RFID standards II
    • EPCglobal Canada, October 14
    • Nigel Wood, "Global Supply Chain GTIN & RFID Standards II", EPC Global Standards Development, EPCglobal Canada, October 14, 2004.
    • (2004) EPC Global Standards Development
    • Wood, N.1
  • 13
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • May-Jun.
    • Simson L. Garfinkel, Ari Juels and Ravi Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions", IEEE SECURITY and Privacy, pp.34-43, May-Jun. 2005.
    • (2005) IEEE SECURITY and Privacy , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 14
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Mar. Springer-Verlag, Boppard, Germany
    • Stephen Weis, Sanjay Sarma, Ronald Rivest and Daniel Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", Conference on Security in Pervasive Computing - SPC 2003, LNCS 2802, pp.454-469, Mar. 2003, Springer-Verlag, Boppard, Germany.
    • (2003) Conference on Security in Pervasive Computing - SPC 2003, LNCS , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 16
    • 33745654539 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting
    • Feb. Springer-Verlag, San Jose, CA, USA
    • Pim Tuyls and Lejla Batina, Lejla, "RFID-Tags for Anti-Counterfeiting", Topics in Cryptology - CT-RSA 2006, LNCS 3860, pp.115-131, Feb. 2006, Springer-Verlag, San Jose, CA, USA.
    • (2006) Topics in Cryptology - CT-RSA 2006, LNCS , vol.3860 , pp. 115-131
    • Tuyls, P.1    Lejla Batina, L.2
  • 18
    • 84941162590 scopus 로고    scopus 로고
    • http://www.spychips.com/what-is-rfid.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.