메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 212-221

The master key: A private authentication approach for pervasive computing environments

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; DATA PRIVACY; INFORMATION RETRIEVAL; NETWORK PROTOCOLS;

EID: 33750380821     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOM.2006.47     Document Type: Conference Paper
Times cited : (14)

References (35)
  • 1
    • 33750306082 scopus 로고    scopus 로고
    • Schlage, "History of Locks," available at http://professional. schlage.com/about_us_historyoflocks.asp.
    • History of Locks
  • 2
    • 3042704844 scopus 로고    scopus 로고
    • Rights amplification in master-keyed mechanical locks
    • M. Blaze, "Rights Amplification in Master-Keyed Mechanical Locks," IEEE SECURITY & PRIVACY, vol. 1, pp. 24-32, 2003.
    • (2003) IEEE Security & Privacy , vol.1 , pp. 24-32
    • Blaze, M.1
  • 4
    • 33750284112 scopus 로고    scopus 로고
    • Introduction to magnetic stripe & other card technologies
    • Singapore
    • S. G. Halliday, "Introduction to Magnetic Stripe & Other Card Technologies," presented at SCAN-TECH ASIA 97, Singapore, 1997.
    • (1997) SCAN-TECH ASIA 97
    • Halliday, S.G.1
  • 5
    • 33750297287 scopus 로고    scopus 로고
    • Association for Payment Clearing Services, "UK CARD FRAUD LOSSES REACH £504.8M," 2005, available at http://www.epaynews.com/downloads/ APACS%20UK%20Card%20Fraud%20PR%208%20March%202005.pdf.
    • (2005) UK Card Fraud Losses Reach£504.8M
  • 7
    • 33750291681 scopus 로고    scopus 로고
    • Smart Card Alliance, "Smart Card Implementation Profiles," available at http://www.smartcardalliance.org/industry_info/profiles.cfm.
    • Smart Card Implementation Profiles
  • 9
    • 33750308408 scopus 로고    scopus 로고
    • AXCESS Inc web site, "Personnel Access Control," 2005, available at http://www.axcessinc.com/.
    • (2005) Personnel Access Control
  • 15
    • 33750329811 scopus 로고    scopus 로고
    • iButton home page, 2005, available at http://www.maxim-ic.com/products/ ibutton/.
    • (2005) IButton Home Page
  • 18
    • 33750343487 scopus 로고    scopus 로고
    • Tiny wireless sensors are poised for market
    • M. Prince, "Tiny Wireless Sensors Are Poised for Market," in The Wall Street Journal, 2003.
    • (2003) The Wall Street Journal
    • Prince, M.1
  • 19
    • 0028322851 scopus 로고
    • A distributed location system for the active office
    • A. Harter and A. Hopper, "A Distributed Location System for the Active Office," IEEE Network, vol. 8, 1994.
    • (1994) IEEE Network , vol.8
    • Harter, A.1    Hopper, A.2
  • 20
    • 33750334988 scopus 로고    scopus 로고
    • Ensure Technologies, available at http://www.ensuretech.com/products/ technology/technology.html#HowXyLocWorks.
  • 21
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Security and privacy concerns
    • S. Prabhakar, S. Pankanti, and A. Jain, "Biometric Recognition: Security and Privacy Concerns," IEEE SECURITY & PRIVACY, vol. MARCH/APRIL, 2003.
    • (2003) IEEE Security & Privacy , vol.MARCH-APRIL
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.3
  • 23
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of ACM, pp. 422-426, 1970.
    • (1970) Communications of ACM , pp. 422-426
    • Bloom, B.1
  • 24
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • A. Broder and M. Mitzenmacher, "Network Applications of Bloom Filters: A Survey," Internet Mathematics, vol. 1, 2005.
    • (2005) Internet Mathematics , vol.1
    • Broder, A.1    Mitzenmacher, M.2
  • 25
    • 33244488406 scopus 로고    scopus 로고
    • E.-J. Goh, "Secure Indexes," 2004, available at http://crypto.stanford.edu/~eujin/papers/secureindex/index.html.
    • (2004) Secure Indexes
    • Goh, E.-J.1
  • 30
  • 31
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them
    • Paris, France
    • Y. Desmedt, "Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them," presented at SecuriCom'88, Paris, France, 1988.
    • (1988) SecuriCom'88
    • Desmedt, Y.1
  • 32
    • 0013433454 scopus 로고
    • Identification tokens - Or: Solving the chess grandmaster problem
    • T. Beth and Y. Desmedt, "Identification tokens - or: Solving the chess grandmaster problem," presented at Advances in Cryptology Crypto '90, 1991.
    • (1991) Advances in Cryptology Crypto '90
    • Beth, T.1    Desmedt, Y.2
  • 35
    • 17644398259 scopus 로고    scopus 로고
    • Secure object identification: Or: solving the Chess Grandmaster Problem
    • Ascona, Switzerland
    • A. Alkassar, C. Stable, and A.-R. Sadeghi, "Secure object identification: or: solving the Chess Grandmaster Problem," presented at the 2003 workshop on New security paradigms, Ascona, Switzerland, 2003.
    • (2003) 2003 Workshop on New Security Paradigms
    • Alkassar, A.1    Stable, C.2    Sadeghi, A.-R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.