메뉴 건너뛰기




Volumn , Issue , 2007, Pages 234-241

Protecting RFID communications in supply chains

Author keywords

Information security; RFID; Supply chain

Indexed keywords

DATA TRANSFER; NETWORK PROTOCOLS; SUPPLY CHAIN MANAGEMENT; SUPPLY CHAINS;

EID: 34748921704     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1229285.1229318     Document Type: Conference Paper
Times cited : (92)

References (24)
  • 2
    • 26444478592 scopus 로고    scopus 로고
    • Rfid traceability: A multilayer problem
    • G. Avoine and P. Oechslin. Rfid traceability: A multilayer problem. In Financial Cryptography, pages 125-140, 2005.
    • (2005) Financial Cryptography , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Crypto '96, pages 1-15.
    • Crypto '96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 34748845985 scopus 로고    scopus 로고
    • K. P. Fishkin and S. Roy. Enhancing RFID privacy via antenna energy analysis, tech. memo IRS-TR-03-012, Intel Research Seattle, 2003.
    • K. P. Fishkin and S. Roy. Enhancing RFID privacy via antenna energy analysis, tech. memo IRS-TR-03-012, Intel Research Seattle, 2003.
  • 6
    • 2942558265 scopus 로고    scopus 로고
    • An RFID bill of rights
    • October
    • S. Garfinkel. An RFID bill of rights. Technology Review, page 35, October 2002.
    • (2002) Technology Review , pp. 35
    • Garfinkel, S.1
  • 7
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • S. L. Garfinkel, A. Juels, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 3(3):34-43, 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 9
    • 23944476196 scopus 로고    scopus 로고
    • A. Juels. Minimalist cryptography for low-cost RFID tags. In SCN, pages 149-164, 2004.
    • A. Juels. Minimalist cryptography for low-cost RFID tags. In SCN, pages 149-164, 2004.
  • 10
    • 35248832722 scopus 로고    scopus 로고
    • Squealing Euros: Privacy protection in RFID-enabled banknotes
    • A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. In Financial Cryptography, pages 103-121, 2003.
    • (2003) Financial Cryptography , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 12
  • 16
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
    • D. Moinar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In Selected Areas in Cryptography, pages 276-290, 2005.
    • (2005) Selected Areas in Cryptography , pp. 276-290
    • Moinar, D.1    Soppera, A.2    Wagner, D.3
  • 17
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures. In ACM
    • D. Moinar and D. Wagner. Privacy and security in library RFID: issues, practices, and architectures. In ACM Conference on Computer and Communications Security, pages 210-219, 2004.
    • (2004) Conference on Computer and Communications Security , pp. 210-219
    • Moinar, D.1    Wagner, D.2
  • 18
    • 25444432606 scopus 로고    scopus 로고
    • RFID privacy issues and technical challenges
    • M. Ohkubo, K. Suzuki, and S. Kinoshita. RFID privacy issues and technical challenges. ACM Communications, 48(9):66-71, 2005.
    • (2005) ACM Communications , vol.48 , Issue.9 , pp. 66-71
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 19
    • 26444435642 scopus 로고    scopus 로고
    • Rfid guardian: A battery-powered mobile device for rfid privacy management
    • M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Rfid guardian: A battery-powered mobile device for rfid privacy management. In ACISP, pages 184-194, 2005.
    • (2005) ACISP , pp. 184-194
    • Rieback, M.R.1    Crispo, B.2    Tanenbaum, A.S.3
  • 20
    • 2942623480 scopus 로고    scopus 로고
    • White paper: RFID systems, security and privacy implications
    • Technical Report MIT-AUTOID-WH-014, Auto-ID Center, MIT, November
    • S. Sarma, S. Weis, and D. Engels. White paper: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, Auto-ID Center, MIT, November 2002.
    • (2002)
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 21
    • 68549104046 scopus 로고    scopus 로고
    • Physical security devices for computer subsystems: A survey of attacks and defences
    • S. Weigart. Physical security devices for computer subsystems: A survey of attacks and defences. In Workshop on Cryptographic Hardware and Embedded Systems, pages 302-317, 2000.
    • (2000) Workshop on Cryptographic Hardware and Embedded Systems , pp. 302-317
    • Weigart, S.1
  • 22
    • 34748825865 scopus 로고    scopus 로고
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In SPC, pages 20.1-2.12, 2003.
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In SPC, pages 20.1-2.12, 2003.
  • 24
    • 33645970405 scopus 로고    scopus 로고
    • Integrity improvements to an rfid privacy protection protocol, for anti-counterfeiting
    • X. Zhang and B. King. Integrity improvements to an rfid privacy protection protocol, for anti-counterfeiting. In ISC, pages 474-481, 2005.
    • (2005) ISC , pp. 474-481
    • Zhang, X.1    King, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.