메뉴 건너뛰기




Volumn , Issue , 2007, Pages

RFID security: A taxonomy of risk

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED IDENTIFICATION TECHNOLOGIES (AIT); RADIO FREQUENCY IDENTIFICATION (RFID); SECURITY RISKS; THREAT MODELS;

EID: 36048979427     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CHINACOM.2006.344722     Document Type: Conference Paper
Times cited : (19)

References (9)
  • 1
    • 13444297889 scopus 로고    scopus 로고
    • Towards the five-cent tag
    • Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Referenced at
    • S.E. Sarma, "Towards the five-cent tag," Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Referenced at http://www. epcglobalinc.org.
    • Sarma, S.E.1
  • 2
    • 20844459862 scopus 로고    scopus 로고
    • RFID Privacy: An Overview of Problems and Proposed Solutions
    • May-June
    • Garfinkel, S., Juels, A., Pappu, R., "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security and Privacy, Volume 3, Issue 3, pp. 34-43, May-June 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.1    Juels, A.2    Pappu, R.3
  • 4
    • 2942556410 scopus 로고    scopus 로고
    • Radio-frequency- identification security risks and challenges. RSA Laboratories
    • S. E. Sarma, S. A. Weis, and D.W. Engels. "Radio-frequency- identification security risks and challenges." RSA Laboratories, CryptoBytes, 6(1), 2003.
    • (2003) CryptoBytes , vol.6 , Issue.1
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 5
    • 84877887414 scopus 로고    scopus 로고
    • Security Analysis of a Cryptographically-Enabled RFID Device
    • P. McDaniel, ed, Usenix Assoc
    • S. Bono et al., "Security Analysis of a Cryptographically-Enabled RFID Device," Usenix Security, P. McDaniel, ed., Usenix Assoc., 2005.
    • (2005) Usenix Security
    • Bono, S.1
  • 6
    • 33744482951 scopus 로고
    • Taxonomy-based risk identification. Technical Report, CMU/SEI-93-TR-6
    • Apr. 25
    • C. F. Walker, F. C. Ulrich, I. Monarch, M. J. Carr, and S. L. Konda. Taxonomy-based risk identification. Technical Report, CMU/SEI-93-TR-6, Apr. 25 1993.
    • (1993)
    • Walker, C.F.1    Ulrich, F.C.2    Monarch, I.3    Carr, M.J.4    Konda, S.L.5
  • 8
    • 18744409344 scopus 로고    scopus 로고
    • The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy
    • V. Atluri, ed, ACM Press
    • A. Juels, R. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy," 8th ACM Conf. Computer and Comm. Security, V. Atluri, ed., ACM Press, 2003, pp. 103-111.
    • (2003) 8th ACM Conf. Computer and Comm. Security , pp. 103-111
    • Juels, A.1    Rivest, R.2    Szydlo, M.3
  • 9
    • 84888742360 scopus 로고    scopus 로고
    • Special Publication SP 800-48, Wireless Network Security: 802.11, Bluetooth, and Handheld Devices, November 2002. URL: http://csrc.nist.gov/ publications/nistpubs/index.html
    • Special Publication SP 800-48, "Wireless Network Security: 802.11, Bluetooth, and Handheld Devices," November 2002. URL: http://csrc.nist.gov/ publications/nistpubs/index.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.