메뉴 건너뛰기




Volumn 4833 LNCS, Issue , 2007, Pages 68-87

On privacy models for RFID

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL STATE INFORMATION; DATA PROCESSING; FORMAL METHODS; PUBLIC KEY CRYPTOGRAPHY;

EID: 38149038702     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76900-2_5     Document Type: Conference Paper
Times cited : (316)

References (39)
  • 1
    • 38349081055 scopus 로고    scopus 로고
    • Aumasson, J.-Ph., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: a Hardware-Oriented Trapdoor Cipher. In: Information Security and Privacy (ACISP 2007), Townsville, Australia. LNCS, 4586, pp. 184-199. Springer, Heidelberg (2007)
    • Aumasson, J.-Ph., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: a Hardware-Oriented Trapdoor Cipher. In: Information Security and Privacy (ACISP 2007), Townsville, Australia. LNCS, vol. 4586, pp. 184-199. Springer, Heidelberg (2007)
  • 3
    • 33745621564 scopus 로고    scopus 로고
    • Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 291-306. Springer, Heidelberg (2006)
    • Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291-306. Springer, Heidelberg (2006)
  • 4
    • 26444478592 scopus 로고    scopus 로고
    • Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 125-140. Springer, Heidelberg (2005)
    • Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
  • 5
    • 38149093695 scopus 로고    scopus 로고
    • Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Security and Privacy in Ad-Hoc and Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, Springer, Heidelberg (2006)
    • Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Security and Privacy in Ad-Hoc and Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, Springer, Heidelberg (2006)
  • 6
    • 84957629783 scopus 로고    scopus 로고
    • Relations Among Notions of Security for Public-Key Encryption Schemes
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 9
    • 33745771966 scopus 로고    scopus 로고
    • Low-Cost Cryptography for Privacy in RFID Systems
    • Domingo-Ferrer, J, Posegga, J, Schreckling, D, eds, CARDIS 2006, Springer, Heidelberg
    • Calmels, B., Canard, S., Girault, M., Sibert, H.: Low-Cost Cryptography for Privacy in RFID Systems. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 237-251. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3928 , pp. 237-251
    • Calmels, B.1    Canard, S.2    Girault, M.3    Sibert, H.4
  • 10
    • 38149006640 scopus 로고    scopus 로고
    • Damgård, I., Østergaard, M.: RFID Security: Tradeoffs between Security and Efficiency. Technical report 2006/234, IACR (2006), http://eprint.iacr.org/2006/234
    • Damgård, I., Østergaard, M.: RFID Security: Tradeoffs between Security and Efficiency. Technical report 2006/234, IACR (2006), http://eprint.iacr.org/2006/234
  • 12
    • 33847330246 scopus 로고    scopus 로고
    • A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks
    • Athens, Greece, IEEE, Los Alamitos
    • Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. In: SecureComm 2005. Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, IEEE, Los Alamitos (2005), http://ieeexplore.ieee.org/iel5/10695/33755/01607559.pdf? arnumber=1607559
    • (2005) SecureComm 2005. Conference on Security and Privacy for Emerging Areas in Communication Networks
    • Dimitriou, T.1
  • 14
    • 35048859848 scopus 로고    scopus 로고
    • Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 357-370. Springer, Heidelberg (2004)
    • Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357-370. Springer, Heidelberg (2004)
  • 15
    • 33845429016 scopus 로고    scopus 로고
    • Feldhofer, M., Rechberger, C.: A Case against Currently used Hash Functions in RFID Protocols. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, 4277, pp. 372-381. Springer, Heidelberg (2006)
    • Feldhofer, M., Rechberger, C.: A Case against Currently used Hash Functions in RFID Protocols. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, vol. 4277, pp. 372-381. Springer, Heidelberg (2006)
  • 16
    • 34547417640 scopus 로고    scopus 로고
    • When Stream Cipher Analysis Meets Public-Key Cryptography (Invited Talk.)
    • Proceedings of SAC, Springer, Heidelberg
    • Finiasz, M., Vaudenay, S.: When Stream Cipher Analysis Meets Public-Key Cryptography (Invited Talk.). In: Proceedings of SAC 2006. LNCS, Springer, Heidelberg (2006)
    • (2006) LNCS
    • Finiasz, M.1    Vaudenay, S.2
  • 17
    • 27644472569 scopus 로고    scopus 로고
    • An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol
    • Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol. IEE Electronic Letters 41, 1169-1170 (2005)
    • (2005) IEE Electronic Letters , vol.41 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 18
    • 35048879274 scopus 로고    scopus 로고
    • Girault, M., Lefranc, D.: Public Key Authentication with One (Online) Single Addition. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 413-427. Springer, Heidelberg (2004)
    • Girault, M., Lefranc, D.: Public Key Authentication with One (Online) Single Addition. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 413-427. Springer, Heidelberg (2004)
  • 19
    • 33749561582 scopus 로고    scopus 로고
    • On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
    • Girault, M., Poupard, G., Stern, J.: On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order. Journal of Cryptology 19, 463-487 (2006)
    • (2006) Journal of Cryptology , vol.19 , pp. 463-487
    • Girault, M.1    Poupard, G.2    Stern, J.3
  • 22
    • 0009342582 scopus 로고    scopus 로고
    • Identification Cards - Contactless Integrated Circuit(s) Cards - Proximity Cards. Part 3: Initialization and Anticollision. ISO
    • ISO/IEC 14443-3
    • ISO/IEC 14443-3. Identification Cards - Contactless Integrated Circuit(s) Cards - Proximity Cards. Part 3: Initialization and Anticollision. ISO (2001)
    • (2001)
  • 23
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with human Protocols
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Juels, A., Weis, S.: Authenticating Pervasive Devices with human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 24
    • 34748832806 scopus 로고    scopus 로고
    • Defining Strong Privacy for RFID
    • Technical report 2006/137, IACR
    • Juels, A., Weis, S.: Defining Strong Privacy for RFID. Technical report 2006/137, IACR (2006), http://eprint.iacr.org/2006/137
    • (2006)
    • Juels, A.1    Weis, S.2
  • 25
    • 33746104831 scopus 로고    scopus 로고
    • Parallel and Concurrent Security of the HB and HB+ Protocols
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Katz, J., Shin, J.S.: Parallel and Concurrent Security of the HB and HB+ Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73-87. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.S.2
  • 27
    • 84977783611 scopus 로고    scopus 로고
    • Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
    • Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
    • Lim, C.H., Kwon, T.: Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4307 , pp. 1-20
    • Lim, C.H.1    Kwon, T.2
  • 28
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and Security in Library RFID: Issues, Practices, and Architectures
    • Washington, DC, USA, pp, ACM Press, New York
    • Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 210-219. ACM Press, New York (2004)
    • (2004) 11th ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 29
    • 0024983231 scopus 로고
    • Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
    • Baltimore, Maryland, U.S.A, pp, ACM Press, New York
    • Naor, M., Yung, M.: Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In: Proceedings of the 22nd ACM Symposium on Theory of Computing, Baltimore, Maryland, U.S.A, pp. 427-437. ACM Press, New York (1990)
    • (1990) Proceedings of the 22nd ACM Symposium on Theory of Computing , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 30
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic Approach to a Privacy Friendly Tag
    • Presented at the, MIT, USA
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to a Privacy Friendly Tag. In: Presented at the RFID Privacy Workshop, MIT, USA (2003)
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 31
    • 38149060413 scopus 로고    scopus 로고
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain based RFID Privacy Protection Scheme. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, 3205, Springer, Heidelberg (2004)
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain based RFID Privacy Protection Scheme. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, Springer, Heidelberg (2004)
  • 32
    • 25444432606 scopus 로고    scopus 로고
    • RFID Privacy Issues and Technical Challenges
    • Ohkubo, M., Suzuki, K.: RFID Privacy Issues and Technical Challenges. Communications of the ACM 48, 66-71 (2005)
    • (2005) Communications of the ACM , vol.48 , pp. 66-71
    • Ohkubo, M.1    Suzuki, K.2
  • 34
    • 84974554584 scopus 로고
    • Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Rackoff, C., Simon, D.: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576
    • Rackoff, C.1    Simon, D.2
  • 35
    • 84887313979 scopus 로고    scopus 로고
    • Searching for Compact Algorithms: CGEN
    • Nguyen, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
    • Robshaw, M.J.B.: Searching for Compact Algorithms: CGEN. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 37-49. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341 , pp. 37-49
    • Robshaw, M.J.B.1
  • 36
    • 85029486638 scopus 로고
    • The Use of Interaction in Public Cryptosystems
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Rudich, S.: The Use of Interaction in Public Cryptosystems. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 242-251. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 242-251
    • Rudich, S.1
  • 37
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of Games: A Tool for Taming Complexity in Security Proofs
    • Technical report 2004/332, IACR
    • Shoup, V.: Sequences of Games: A Tool for Taming Complexity in Security Proofs. Technical report 2004/332, IACR (2004), http://eprint.iacr.org/2004/332
    • (2004)
    • Shoup, V.1
  • 38
    • 34547414125 scopus 로고    scopus 로고
    • RFID Privacy based on Public-Key Cryptography (Invited Talk)
    • Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
    • Vaudenay, S.: RFID Privacy based on Public-Key Cryptography (Invited Talk). In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 1-6. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4296 , pp. 1-6
    • Vaudenay, S.1
  • 39
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
    • Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 454-469. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.