메뉴 건너뛰기




Volumn 4809 LNCS, Issue , 2007, Pages 795-807

Low-cost and strong-security RFID authentication protocol

Author keywords

Authentication; Indistinguishability; RFID system; Strong privacy; Trace ability

Indexed keywords

DATA PRIVACY; DATABASE SYSTEMS; NATURAL FREQUENCIES; NETWORK PROTOCOLS;

EID: 38149047468     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77090-9_72     Document Type: Conference Paper
Times cited : (26)

References (11)
  • 1
    • 33847330246 scopus 로고    scopus 로고
    • Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: SecureComm 2005. Security and Privacy for Emerging Areas in Communications Networks-2005, pp. 59-66 (September 2005)
    • Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: SecureComm 2005. Security and Privacy for Emerging Areas in Communications Networks-2005, pp. 59-66 (September 2005)
  • 4
    • 34748832806 scopus 로고    scopus 로고
    • Defining strong privacy for RFID, Cryptology ePrint Archieve
    • Report 2006/137 Referenced , at
    • Juels, A., Weis, S.A.: Defining strong privacy for RFID, Cryptology ePrint Archieve, Report 2006/137 Referenced (2006), at http://eprint.iacr.org
    • (2006)
    • Juels, A.1    Weis, S.A.2
  • 6
    • 34247218520 scopus 로고    scopus 로고
    • RFID: Mutual Authentication Scheme based on Synchronized Secret Information
    • Lee, S., Asano, T., Kim, K.: RFID: Mutual Authentication Scheme based on Synchronized Secret Information. In: Proceedings of the SCIS 2006 (2006)
    • (2006) Proceedings of the SCIS
    • Lee, S.1    Asano, T.2    Kim, K.3
  • 8
    • 24644501824 scopus 로고    scopus 로고
    • Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response Based on RFID Authentication Protocol for Distributed Database Envirionment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, 3450, Springer, Heidelberg (2005)
    • Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response Based on RFID Authentication Protocol for Distributed Database Envirionment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, Springer, Heidelberg (2005)
  • 11
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engles, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engles, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.