메뉴 건너뛰기




Volumn 4456 LNAI, Issue , 2007, Pages 788-794

Security and privacy on authentication protocol for low-cost RFID

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; AUTOMATIC PROGRAMMING; COMPUTATION THEORY; DATA PRIVACY; INFORMATION RETRIEVAL; PROBLEM SOLVING;

EID: 38349029419     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74377-4_82     Document Type: Conference Paper
Times cited : (8)

References (12)
  • 1
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of lowcost radio frequency identification systems
    • Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
    • Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of lowcost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 2
    • 35248832722 scopus 로고    scopus 로고
    • Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, 2742, pp. 103-121. Springer, Heidelberg (2003)
    • Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103-121. Springer, Heidelberg (2003)
  • 3
    • 38349023567 scopus 로고    scopus 로고
    • Molnar, D., Soppera, A., Wagner, D.: A scalable delegatable pseudonym protocol enabling ownership transfer of RFID tags, In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography-SAC 2005. LNCS, Springer, Heidelberg (2005)
    • Molnar, D., Soppera, A., Wagner, D.: A scalable delegatable pseudonym protocol enabling ownership transfer of RFID tags, In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography-SAC 2005. LNCS, Springer, Heidelberg (2005)
  • 8
    • 18744409344 scopus 로고    scopus 로고
    • Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111 (2003)
    • Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111 (2003)
  • 9
    • 35048899238 scopus 로고    scopus 로고
    • Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 163-178. Springer, Heidelberg (2004)
    • Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163-178. Springer, Heidelberg (2004)
  • 10
    • 23944476196 scopus 로고    scopus 로고
    • Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 149-164. Springer, Heidelberg (2005)
    • Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149-164. Springer, Heidelberg (2005)
  • 11
    • 33744940544 scopus 로고    scopus 로고
    • Efficient RFID Authentication protocol for Ubiquitous Computing Environment
    • Enokido, T, Yan, L, Xiao, B, Kim, D, Dai, Y, Yang, L.T, eds, International Workshop on Security in Ubiquitous Computing Systems, secubiq, Springer, Heidelberg
    • Choi, E.Y., Lee, S.M., Lee, D.H.: Efficient RFID Authentication protocol for Ubiquitous Computing Environment. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) International Workshop on Security in Ubiquitous Computing Systems - secubiq 2005. LNCS, vol. 3823, pp. 945-954. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3823 , pp. 945-954
    • Choi, E.Y.1    Lee, S.M.2    Lee, D.H.3
  • 12
    • 33845531085 scopus 로고    scopus 로고
    • Radio frequency identification: Adversary model and attacks on existing protocols
    • Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland September
    • Avoine, G.: Radio frequency identification: adversary model and attacks on existing protocols, Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland (September 2005)
    • (2005)
    • Avoine, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.