메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 59-66

A lightweight RFID protocol to protect against traceability and cloning attacks

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; NETWORK PROTOCOLS; PATTERN MATCHING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33847330246     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURECOMM.2005.4     Document Type: Conference Paper
Times cited : (341)

References (16)
  • 1
    • 33847259724 scopus 로고    scopus 로고
    • Wal-Mart Details RFID Requirement, November 6, 2003. Article appears in http://www.rfidjournal.com/article/ articleview/642/1/1/
    • Wal-Mart Details RFID Requirement, November 6, 2003. Article appears in http://www.rfidjournal.com/article/ articleview/642/1/1/
  • 2
    • 33847309803 scopus 로고    scopus 로고
    • U.S. Military to Issue RFID Mandate, September 15, 2003. Article appears in http://www.rfidjournal.com/article/ articleview/576/1/1/
    • U.S. Military to Issue RFID Mandate, September 15, 2003. Article appears in http://www.rfidjournal.com/article/ articleview/576/1/1/
  • 8
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers
    • Dirk Henrici and Paul Müller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," Workshop on Pervasive Computing and Communications Security, 2004.
    • (2004) Workshop on Pervasive Computing and Communications Security
    • Henrici, D.1    Müller, P.2
  • 13
    • 2942623480 scopus 로고    scopus 로고
    • RFID systems, security and privacy implications
    • Technical report MIT-AUTOID-WH-014, AutoID center, MIT
    • S. E. Sarma, S. A. Weis and D. W. Engels, "RFID systems, security and privacy implications," Technical report MIT-AUTOID-WH-014, AutoID center, MIT, 2002
    • (2002)
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 15
    • 0002885224 scopus 로고    scopus 로고
    • Prudent Engineering Practice for Cryptographic Protocols
    • Martin Abadi and Roger Needham, "Prudent Engineering Practice for Cryptographic Protocols," IEEE Transactions on Software Engineering, Vol. 22, No. 1, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1
    • Abadi, M.1    Needham, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.