메뉴 건너뛰기




Volumn 51, Issue 9, 2007, Pages 2268-2279

A distributed architecture for scalable private RFID tag identification

Author keywords

Identification; Privacy; RFID; Scalability; Security

Indexed keywords

COMPUTER ARCHITECTURE; DATA PRIVACY; IDENTIFICATION (CONTROL SYSTEMS); NETWORK PROTOCOLS; SCALABILITY; SECURITY OF DATA;

EID: 34247465966     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2007.01.012     Document Type: Article
Times cited : (37)

References (18)
  • 1
    • 0038271926 scopus 로고    scopus 로고
    • Supermarket cards: the tip of the retail surveillance iceberg
    • Albrecht K. Supermarket cards: the tip of the retail surveillance iceberg. Denver University Law Review 79 (2002) 534-565. http://www.spychips.com/documents/Albrecht-Denver-Law.pdf
    • (2002) Denver University Law Review , vol.79 , pp. 534-565
    • Albrecht, K.1
  • 3
    • 26444443915 scopus 로고    scopus 로고
    • G. Avoine, P. Oechslin, A scalable and provably secure hash-based RFID protocol, in: Third IEEE International Conference on Pervasive Computing and Communications Workshops 2005, March, pp. 110-114.
  • 4
    • 34247545963 scopus 로고    scopus 로고
    • E. Batista. What your clothes say about you, Wired News http://www.wired.com, 2003. http://www.wired.com/news/wireless/0,1382,58006,00.html.
  • 5
    • 34247469172 scopus 로고    scopus 로고
    • Boycott Benetton, http://www.boycottbenetton.com.
  • 6
    • 34247483809 scopus 로고    scopus 로고
    • M. Burmester, T. van Le, B. de Medeiros, Provably secure ubiquitous systems: Universally composable RFID authentication protocols, 2006. Referenced 2006 at http://eprint.iacr.org/2006/131.pdf.
  • 7
    • 33746330954 scopus 로고    scopus 로고
    • Adaptive gossip protocols: managing security and redundancy in dense ad hoc networks
    • Burmester M., van Le T., and Yasinsac A. Adaptive gossip protocols: managing security and redundancy in dense ad hoc networks. Journal of Ad hoc Networks 4 3 (2006) 504-515
    • (2006) Journal of Ad hoc Networks , vol.4 , Issue.3 , pp. 504-515
    • Burmester, M.1    van Le, T.2    Yasinsac, A.3
  • 8
    • 34247538705 scopus 로고    scopus 로고
    • C.A.S.P.I.A.N. http://www.nocards.org.
  • 9
    • 34247498933 scopus 로고    scopus 로고
    • S.J. Engberg, M.B. Harning, C.D. Jensen, Zero-knowledge device authentication: privacy & security enhanced RFID preserving business value and consumer convenience, in: Second Annual Conference on Privacy, Security and Trust 2004. Referenced 2006 at http://www.obivision.com/Papers/PST2004_RFID_ed.pdf.
  • 10
    • 34247482932 scopus 로고    scopus 로고
    • C.C. Haley, Are you ready for RFID? Internetnews.com, November 2003. http://www.internetnews.com/wireless/article.php/3109501.
  • 11
    • 34247519936 scopus 로고    scopus 로고
    • J.E. Henning, Preserving privacy in RFID deployment, Technical Report RVS-Occ-04-01, RVS, Faculty of Technology, University of Bielefeld, March 2004.
  • 13
    • 34247508420 scopus 로고    scopus 로고
    • A. Juels, S.A. Weis, Defining strong privacy for RFID, 2006. http://www.rsasecurity.com/rsalabs/node.asp?id=3046, submitted for publication.
  • 14
    • 33749005411 scopus 로고    scopus 로고
    • Y. Nohara, S. Inoue, K. Baba, H. Yasuura, Quantitative evaluation of unlinkable ID matching schemes, in: Workshop on Privacy in the Electronic Society (WPES), 2005.
  • 15
    • 34247503527 scopus 로고    scopus 로고
    • M. Ohkubo, K. Suzuki, S. Kinoshita, Efficient hash-chain based RFID privacy protection scheme, in: International Conference on Obiquitous Computing - Ubicomp, Workshop Privacy, Current Status and Future Directions, 2004.
  • 16
    • 34247548166 scopus 로고    scopus 로고
    • Boycott Tesco, http://news.zdnet.co.uk/0,39020330,39185481,00.htm.
  • 17
    • 33750290259 scopus 로고    scopus 로고
    • G. Tsudik, YA-TRAP. yet another trivial RFID authentication protocol, in: PerCom Workshops 2006, IEEE Computer Society, Pisa, Italy, 2006, pp. 640-643.
  • 18
    • 35048876270 scopus 로고    scopus 로고
    • S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: Security in Pervasive Computing, vol. 2802 of Lecture Notes in Computer Science 2004, pp. 201-212.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.