메뉴 건너뛰기




Volumn , Issue , 2007, Pages 949-954

A secure communication protocol for low-cost RFID system

Author keywords

[No Author keywords available]

Indexed keywords

COST FUNCTIONS; DATA PRIVACY; IDENTIFICATION (CONTROL SYSTEMS); NETWORK SECURITY; PROBLEM SOLVING; TELECOMMUNICATION NETWORKS;

EID: 38049053508     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2007.4385207     Document Type: Conference Paper
Times cited : (5)

References (10)
  • 1
    • 2942614621 scopus 로고    scopus 로고
    • Security and Privacy in Radio Frequency Identification Devices
    • MS Thesis, MIT, May
    • S. A. Sarma, S. A. Weis, R. L. Rivest, and D. W. Engels, "Security and Privacy in Radio Frequency Identification Devices", MS Thesis, MIT, May 2003.
    • (2003)
    • Sarma, S.A.1    Weis, S.A.2    Rivest, R.L.3    Engels, D.W.4
  • 3
    • 38049014800 scopus 로고    scopus 로고
    • M. Ohkubo, K Suzuki, and S, Kinochita, Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low Cost RFID, Proceedings of the SCIS 2004, pp.719-724
    • M. Ohkubo, K Suzuki, and S, Kinochita, Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low Cost RFID, Proceedings of the SCIS 2004, pp.719-724
  • 4
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • International Conference on Security in Communication Networks, Springer-Verilog, September
    • A. Juels. "Minimalist cryptography for low-cost RFID tags", International Conference on Security in Communication Networks 2004, Springer-Verilog, September 2004, LNCS 3352, pp. 149-164.
    • (2004) LNCS , vol.3352 , pp. 149-164
    • Juels, A.1
  • 5
    • 36249031858 scopus 로고    scopus 로고
    • HB and related lightweight authentication protocols for secure RFID tag/reader authentication
    • June
    • S. Piramuthu. "HB and related lightweight authentication protocols for secure RFID tag/reader authentication", In Collaborative Electronic Commerce Technology and Research 2006, June 2006.
    • (2006) Collaborative Electronic Commerce Technology and Research 2006
    • Piramuthu, S.1
  • 6
    • 36448933755 scopus 로고    scopus 로고
    • Analyzing the HB and HB+ protocols in the "large error" case
    • Cryptology ePrint Archive, Report 2006/326
    • J. Katz and A. Smith. "Analyzing the HB and HB+ protocols in the "large error" case", Cryptology ePrint Archive, Report 2006/326, 2006.
    • (2006)
    • Katz, J.1    Smith, A.2
  • 7
    • 84856043672 scopus 로고
    • A Mathematical Theory of Communication
    • July, October
    • CE. Shannon, "A Mathematical Theory of Communication", Bell System Technical Journal, July, October, 1948, Vol. 27, pp. 379-423, 623-656
    • (1948) Bell System Technical Journal , vol.27
    • Shannon, C.E.1
  • 8
    • 38049026171 scopus 로고    scopus 로고
    • L. Gong, R. Needham. R, Yahalom, Reasoning about Belief in Cryptographic Protocols, IEEE, 1990.
    • L. Gong, R. Needham. R, Yahalom, "Reasoning about Belief in Cryptographic Protocols", IEEE, 1990.
  • 9
    • 38049041326 scopus 로고    scopus 로고
    • M. Feldhofer and Christian Rechberger. A case against currently used hash functions in RFID protocols, Printed handout of Workshop on RFID Security 06, July 2006.
    • M. Feldhofer and Christian Rechberger. "A case against currently used hash functions in RFID protocols", Printed handout of Workshop on RFID Security 06, July 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.