메뉴 건너뛰기




Volumn 43, Issue 3, 2007, Pages 897-914

Protocols for RFID tag/reader authentication

Author keywords

Light weight cryptography; RFID; Secure authentication

Indexed keywords

BAR CODES; DATA PRIVACY; DECISION SUPPORT SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; STORAGE ALLOCATION (COMPUTER);

EID: 33947538532     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2007.01.003     Document Type: Article
Times cited : (107)

References (45)
  • 1
    • 33845531085 scopus 로고    scopus 로고
    • Radio frequency identification: adversary model and attacks on existing protocols
    • Avoine G. Radio frequency identification: adversary model and attacks on existing protocols. Technical Report LASEC-REPORT-2005-001 (September 2005)
    • (2005) Technical Report LASEC-REPORT-2005-001
    • Avoine, G.1
  • 5
    • 24144453496 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • Blum A., Kalai A., and Wasserman H. Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM 50 4 (July 2003) 506-519
    • (2003) Journal of the ACM , vol.50 , Issue.4 , pp. 506-519
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 7
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Advances in Cryptology - EURO-CRYPT'93
    • Brands S., and Chaum D. Distance-bounding protocols. Advances in Cryptology - EURO-CRYPT'93. Lecture Notes in Computer Science vol. 765 (1994) 344-359
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 9
    • 33745771753 scopus 로고    scopus 로고
    • Noisy tags: a pretty good key exchange protocol for RFID tags
    • International Conference on Smart Card Research and Advanced Applications - CARDIS
    • Castelluccia C., and Avoine G. Noisy tags: a pretty good key exchange protocol for RFID tags. International Conference on Smart Card Research and Advanced Applications - CARDIS. Lecture Notes in Computer Science vol. 3928 (2006) 289-299
    • (2006) Lecture Notes in Computer Science , vol.3928 , pp. 289-299
    • Castelluccia, C.1    Avoine, G.2
  • 10
    • 84881072062 scopus 로고
    • A computing procedure for quantification theory
    • Davis M., and Putnam H. A computing procedure for quantification theory. Journal of the ACM (1960) 201-215
    • (1960) Journal of the ACM , pp. 201-215
    • Davis, M.1    Putnam, H.2
  • 11
    • 1542341270 scopus 로고    scopus 로고
    • Location-based authentication: grounding cyberspace for better security
    • Denning D.E., and MacDoran P.F. Location-based authentication: grounding cyberspace for better security. Computer Fraud and Security 1996 2 (1996) 12-16
    • (1996) Computer Fraud and Security , vol.1996 , Issue.2 , pp. 12-16
    • Denning, D.E.1    MacDoran, P.F.2
  • 17
    • 33646820465 scopus 로고    scopus 로고
    • GT6 algorithm solves the extended DIMACS 32-bit parity problem
    • Greentech Computing Limited, London, England
    • Greentech Computing. GT6 algorithm solves the extended DIMACS 32-bit parity problem. Technical Report (1998), Greentech Computing Limited, London, England
    • (1998) Technical Report
    • Greentech Computing1
  • 18
    • 33750459716 scopus 로고    scopus 로고
    • Supply chain information sharing in a micro prediction market
    • Guo Z., Fang F., and Whinston A.B. Supply chain information sharing in a micro prediction market. Decision Support Systems 42 (2006) 1944-1958
    • (2006) Decision Support Systems , vol.42 , pp. 1944-1958
    • Guo, Z.1    Fang, F.2    Whinston, A.B.3
  • 21
    • 33749575090 scopus 로고    scopus 로고
    • Mobile decision support for in-store purchase decisions
    • Heijden H.V.D. Mobile decision support for in-store purchase decisions. Decision Support Systems 42 (2006) 656-663
    • (2006) Decision Support Systems , vol.42 , pp. 656-663
    • Heijden, H.V.D.1
  • 24
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Advances in Cryptology - ASIACRYPT 2001. Boyd C. (Ed), Springer-Verlag
    • Hopper N.J., and Blum M.M. Secure human identification protocols. In: Boyd C. (Ed). Advances in Cryptology - ASIACRYPT 2001. Lecture Notes in Computer Science vol. 2248 (2001), Springer-Verlag 52-66
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.M.2
  • 26
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Advanced in Cryptology - CRYPTO'05. Shoup V. (Ed), Springer-Verlag
    • Juels A., and Weis S.A. Authenticating pervasive devices with human protocols. In: Shoup V. (Ed). Advanced in Cryptology - CRYPTO'05. Lecture Notes in Computer vol. 3126 (2005), Springer-Verlag 293-308
    • (2005) Lecture Notes in Computer , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 32
    • 33947535012 scopus 로고    scopus 로고
    • Detecting Relay Attacks with Timing-Based Protocols
    • http://eprints.qut.edu.au/view/year/2006.html
    • Reid J., Gonzalez Nieto J.M., Tang T., and Senadji B. Detecting Relay Attacks with Timing-Based Protocols. Queensland University of Technology, ePrint (2006). http://eprints.qut.edu.au/view/year/2006.html http://eprints.qut.edu.au/view/year/2006.html
    • (2006) Queensland University of Technology, ePrint
    • Reid, J.1    Gonzalez Nieto, J.M.2    Tang, T.3    Senadji, B.4
  • 38
    • 0032178308 scopus 로고    scopus 로고
    • A two-phase algorithm for solving a class of hard satisfiability problems
    • Warners J.P., and Maaren H.V. A two-phase algorithm for solving a class of hard satisfiability problems. Operations Research Letters vol. 23 (1998) 81-88
    • (1998) Operations Research Letters , vol.23 , pp. 81-88
    • Warners, J.P.1    Maaren, H.V.2
  • 39
    • 33947505460 scopus 로고    scopus 로고
    • Why Some People Put These Credit Cards in the Microwave
    • Warren S. Why Some People Put These Credit Cards in the Microwave. The Wall Street Journal Online (April 10 2006) A1-A16
    • (2006) The Wall Street Journal Online
    • Warren, S.1
  • 42
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: an overview of problems and proposed solutions
    • Garfinkel S., Juels A., and Pappu R. RFID privacy: an overview of problems and proposed solutions. IEEE Security and Privacy 3 3 (May-June 2005) 34-43
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.1    Juels, A.2    Pappu, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.