메뉴 건너뛰기




Volumn 4116 LNCS, Issue , 2006, Pages 303-320

Shoehorning security into the EPC tag standard

Author keywords

Authentication; Cloning; Counterfeiting; EPC; PIN; RFID

Indexed keywords

CLONING; COMPUTATION THEORY; COMPUTER SOFTWARE REUSABILITY; CRYPTOGRAPHY; DATA PRIVACY; IDENTIFICATION (CONTROL SYSTEMS); STANDARDS;

EID: 33750018373     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11832072_21     Document Type: Conference Paper
Times cited : (29)

References (32)
  • 1
    • 84941148989 scopus 로고    scopus 로고
    • Referenced 2006
    • ECRYPT (European network for excellence in cryptology), stream cipher project Web page, 2006. Referenced 2006 at http://www.ecrypt.eu.org/stream/.
    • (2006)
  • 3
    • 33947515842 scopus 로고    scopus 로고
    • Reducing time complexity in RFID systems
    • B. Preneel and S. Tavares, editors, Lecture Notes in Computer Science. Springer-Verlag
    • G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In B. Preneel and S. Tavares, editors, Selected Areas in Cryptography - SAC 2005, Lecture Notes in Computer Science. Springer-Verlag, 2005.
    • (2005) Selected Areas in Cryptography - SAC 2005
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 4
    • 84877887414 scopus 로고    scopus 로고
    • Security analysis of a cryptographically-enabled RFID device
    • P. McDaniel, editor, USENIX
    • S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo. Security analysis of a cryptographically-enabled RFID device. In P. McDaniel, editor, 14th USENIX Security Symposium, pages 1-16. USENIX, 2005. Dedicated Web site at www.rfidanalysis.org.
    • (2005) 14th USENIX Security Symposium , pp. 1-16
    • Bono, S.1    Green, M.2    Stubblefield, A.3    Juels, A.4    Rubin, A.5    Szydlo, M.6
  • 5
    • 84856371944 scopus 로고    scopus 로고
    • Ge uses RFID to secure cargo
    • 12 January. Referenced 2006
    • J. Collins. Ge uses RFID to secure cargo. RFID Journal, 12 January 2005. Referenced 2006 at http://www.rfidjournal.com/article/articleview/1317/1/1/.
    • (2005) RFID Journal
    • Collins, J.1
  • 7
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • M. Joye and J.-J. Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES '04, Springer-Verlag
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In M. Joye and J.-J. Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES '04, volume 3156 of Lecture Notes in Computer Science, pages 357-370. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 9
    • 35048899238 scopus 로고    scopus 로고
    • Universal re-encryption for mixnets
    • T. Okamoto, editor, RSA Conference - Cryptographers' Track (CT-RSA)
    • P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets. In T. Okamoto, editor, RSA Conference - Cryptographers' Track (CT-RSA), volume 2964 of Lecture Notes in Computer Science, pages 163-178, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2964 , pp. 163-178
    • Golle, P.1    Jakobsson, M.2    Juels, A.3    Syverson, P.4
  • 16
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • C. Blundo and S. Cimato, editors, The Fourth International Conference on Security in Communication Networks - SCN 2004, Springer-Verlag
    • A. Juels. Minimalist cryptography for low-cost RFID tags. In C. Blundo and S. Cimato, editors, The Fourth International Conference on Security in Communication Networks - SCN 2004, volume 3352 of Lecture Notes in Computer Science, pages 149-164. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3352 , pp. 149-164
    • Juels, A.1
  • 18
    • 33749028998 scopus 로고    scopus 로고
    • Strengthing EPC tags against cloning
    • ACM Press
    • A. Juels. Strengthing EPC tags against cloning. In ACM Workshop on Wireless Security (WiSe), pages 67-76. ACM Press, 2005.
    • (2005) ACM Workshop on Wireless Security (WiSe) , pp. 67-76
    • Juels, A.1
  • 19
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • To appear. Online version referenced 2005
    • A. Juels. RFID security and privacy: A research survey. J-SAC, 2006. To appear. Online version referenced 2005 at http://www.rsasecurity.com/rsalabs/ node.asp?id=2937.
    • (2006) J-SAC
    • Juels, A.1
  • 20
  • 21
    • 33144459893 scopus 로고    scopus 로고
    • High-power proxies for enhancing RFID privacy and utility
    • G. Danezis and D. Martin, editors.
    • A. Juels, P. Syverson, and D. Bailey. High-power proxies for enhancing RFID privacy and utility. In G. Danezis and D. Martin, editors. Privacy Enhancing Technologies (PET), 2005.
    • (2005) Privacy Enhancing Technologies (PET)
    • Juels, A.1    Syverson, P.2    Bailey, D.3
  • 22
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Springer-Verlag
    • A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In Advances in Cryptology - CRYPTO 2005, pages 293-308. Springer-Verlag, 2005.
    • (2005) Advances in Cryptology - CRYPTO 2005 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 24
    • 33749011985 scopus 로고    scopus 로고
    • Disabling RFID tags with visible confirmation: Clipped tags are silenced (short paper)
    • S. De Capitani di Vimercati and R. Dingledine, editors
    • G. Karjoth and P. Moskowitz. Disabling RFID tags with visible confirmation: Clipped tags are silenced (short paper). In S. De Capitani di Vimercati and R. Dingledine, editors, Workshop on Privacy in the Electronic Society (WPES), 2005.
    • (2005) Workshop on Privacy in the Electronic Society (WPES)
    • Karjoth, G.1    Moskowitz, P.2
  • 25
    • 33749013010 scopus 로고    scopus 로고
    • Privacy for RFID through trusted computing (short paper)
    • S. De Capitani di Vimercati and R. Dingledine, editors
    • D. Molnar, A. Soppera, and D. Wagner. Privacy for RFID through trusted computing (short paper). In S. De Capitani di Vimercati and R. Dingledine, editors, Workshop on Privacy in the Electronic Society (WPES), 2005.
    • (2005) Workshop on Privacy in the Electronic Society (WPES)
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 26
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • B. Pfitzmann and P. McDaniel, editors, ACM Press
    • D. Molnar and D. Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In B. Pfitzmann and P. McDaniel, editors, ACM Conference on Communications and Computer Security, pages 210 - 219, ACM Press, 2004.
    • (2004) ACM Conference on Communications and Computer Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 28
    • 0037144430 scopus 로고    scopus 로고
    • Physical one-way functions
    • September
    • R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical one-way functions. Science, 297:2026-2030, September 2002.
    • (2002) Science , vol.297 , pp. 2026-2030
    • Pappu, R.1    Recht, B.2    Taylor, J.3    Gershenfeld, N.4
  • 29
    • 26444435642 scopus 로고    scopus 로고
    • RFID Guardian: A battery-powered mobile device for RFID privacy management
    • Colin Boyd and Juan Manuel Gonzalez Nieto, editors, Australasian Conference on Information Security and Privacy - ACISP 2005, Springer-Verlag
    • M. Rieback, B. Crispo, and A. Tanenbaum. RFID Guardian: A battery-powered mobile device for RFID privacy management. In Colin Boyd and Juan Manuel Gonzalez Nieto, editors, Australasian Conference on Information Security and Privacy - ACISP 2005, volume 3574 of Lecture Notes in Computer Science, pages 184-194. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 184-194
    • Rieback, M.1    Crispo, B.2    Tanenbaum, A.3
  • 30
    • 33644541758 scopus 로고    scopus 로고
    • Extending the EPC network - The potential of RFID in anti-counterfeiting
    • ACM Press
    • T. Staake, F. Thiesse, and E. Fleisch. Extending the EPC network - the potential of RFID in anti-counterfeiting. In ACM Symposium on Applied Computing, pages 1607-1612. ACM Press, 2005.
    • (2005) ACM Symposium on Applied Computing , pp. 1607-1612
    • Staake, T.1    Thiesse, F.2    Fleisch, E.3
  • 31
    • 34547618979 scopus 로고    scopus 로고
    • Rfid-tags for anti-counterfeiting
    • Springer-Verlag, To appear
    • P. Tuyls and L. Batina. Rfid-tags for anti-counterfeiting. In CT-RSA 06. Springer-Verlag, 2006. To appear.
    • (2006) CT-RSA 06
    • Tuyls, P.1    Batina, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.