메뉴 건너뛰기




Volumn , Issue , 2007, Pages 229-234

RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; DATA PRIVACY; NETWORK PROTOCOLS;

EID: 34547672707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOMW.2007.100     Document Type: Conference Paper
Times cited : (40)

References (18)
  • 1
    • 26444443915 scopus 로고    scopus 로고
    • G. Avoine and P. Oechslin. A scalable and provably secure hash based RFID protocol. In International Workshop on Pervasive Computing and Communication Security - PerSec 2005, pages 110-114, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press.
    • G. Avoine and P. Oechslin. A scalable and provably secure hash based RFID protocol. In International Workshop on Pervasive Computing and Communication Security - PerSec 2005, pages 110-114, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press.
  • 2
    • 38549138054 scopus 로고    scopus 로고
    • New proofs for NMAC and HMAC: Security without collision-resistance
    • Santa Barbara, California, USA, to appear. IEEE Computer Society
    • th Annual International Cryptology Conference, CRYPTO'06, page 640, Santa Barbara, California, USA, 2006, to appear. IEEE Computer Society.
    • (2006) th Annual International Cryptology Conference, CRYPTO'06 , pp. 640
    • Bellare, M.1
  • 3
    • 84958979095 scopus 로고    scopus 로고
    • Weierstrass elliptic curves and side-channel attacks
    • Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002
    • E. Brier and M. Joye. Weierstrass elliptic curves and side-channel attacks. In Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, LNCS 2274, pages 335-345, 2002.
    • (2002) LNCS , vol.2274 , pp. 335-345
    • Brier, E.1    Joye, M.2
  • 7
    • 34547630116 scopus 로고    scopus 로고
    • Secure anonymous RFID authentication protocols
    • Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA
    • C. Chatmon, T. v. Le, and M. Burmester. Secure anonymous RFID authentication protocols. Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA, 2006.
    • (2006)
    • Chatmon, C.1    Le, T.V.2    Burmester, M.3
  • 9
    • 33144487342 scopus 로고    scopus 로고
    • An active attack against HB+ - a provably secure lightweight authentication protocol. Cryptology ePrint Archive
    • Report 2005/237
    • H. Gilbert, M. Robshaw, and H. Sibert. An active attack against HB+ - a provably secure lightweight authentication protocol. Cryptology ePrint Archive, Report 2005/237, 2005.
    • (2005)
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 13
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • V. Shoup, editor, Advances in Cryptology, CRYPTO'05, of, Santa Barbara, California, USA, August
    • A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In V. Shoup, editor, Advances in Cryptology - CRYPTO'05, volume 3126 of LNCS, pages 293-308, Santa Barbara, California, USA, August 2005.
    • (2005) LNCS , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 17
    • 36249031858 scopus 로고    scopus 로고
    • HB and related lightweight authentication protocols for secure RFID tag/reader authentication
    • Basel, Switzerland, June
    • S. Piramuthu. HB and related lightweight authentication protocols for secure RFID tag/reader authentication. In Collaborative Electronic Commerce Technology and Research - CoIlECTeR 2006, Basel, Switzerland, June 2006.
    • (2006) Collaborative Electronic Commerce Technology and Research - CoIlECTeR 2006
    • Piramuthu, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.