메뉴 건너뛰기




Volumn 4456 LNAI, Issue , 2007, Pages 778-787

An efficient and secure RFID security method with ownership transfer

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL EFFICIENCY; CRYPTOGRAPHY; DATA TRANSFER; REQUIREMENTS ENGINEERING; UBIQUITOUS COMPUTING;

EID: 38349066494     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74377-4_81     Document Type: Conference Paper
Times cited : (42)

References (10)
  • 1
    • 33745621564 scopus 로고    scopus 로고
    • Reducing Time Complexity in RFID Systems
    • Preneel, B, Tavares, S, eds, Selected Areas in Cryptography, Springer, Heidelberg
    • Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography. LNCS, vol. 3897, pp. 291-306. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3897 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 2
    • 33745926180 scopus 로고    scopus 로고
    • New Security Problem in RFID Systems Tag Killing
    • Gavrilova, M, Gervasi, O, Kumar, V, Tan, C.J.K, Taniar, D, Laganà, A, Mun, Y, Choo, H, eds, Computational Science and Its Applications, ICCSA 2006, Springer, Heidelberg
    • Han, D.G., Takagi, T., Kim, H.W., Chung, K.I.: New Security Problem in RFID Systems Tag Killing. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) Computational Science and Its Applications - ICCSA 2006. LNCS, vol. 3982, pp. 375-384. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3982 , pp. 375-384
    • Han, D.G.1    Takagi, T.2    Kim, H.W.3    Chung, K.I.4
  • 4
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic Approach to Privacy Friendly Tags
    • MIT, Cambridge, MA
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy Friendly Tags. In: RFID Privacy Workshop, MIT, Cambridge, MA (2003)
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 5
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-Response based RFID Authentication Protocol for Distributed Database Environment
    • Hutter, D, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
    • Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 3450, pp. 70-84. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 6
    • 33744928896 scopus 로고    scopus 로고
    • Saito, J., Imamoto, K., Sakurai, K.: Reassignment Scheme of an RFID Tag's Key for Owner Transfer. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing - EUC 2005 Workshops. LNCS, 3823, pp. 1303-1312. Springer, Heidelberg (2005)
    • Saito, J., Imamoto, K., Sakurai, K.: Reassignment Scheme of an RFID Tag's Key for Owner Transfer. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing - EUC 2005 Workshops. LNCS, vol. 3823, pp. 1303-1312. Springer, Heidelberg (2005)
  • 7
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 8
    • 33745757995 scopus 로고    scopus 로고
    • RFID: Authentication Protocol with Strong Resistance against Traceability and Denial of Service Attacks
    • Molva, R, Tsudik, G, Westhoff, D, eds, Security and Privacy in Ad-hoc and Sensor Networks, Springer, Heidelberg
    • Kang, J., Nyang, D.: RFID: Authentication Protocol with Strong Resistance against Traceability and Denial of Service Attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) Security and Privacy in Ad-hoc and Sensor Networks. LNCS, vol. 3813, pp. 164-175. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3813 , pp. 164-175
    • Kang, J.1    Nyang, D.2
  • 9
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and Security in Library RFID: Issues, Practices, and Architectures
    • ACM Press, New York
    • Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: ACM CCS, pp. 210-219. ACM Press, New York (2004)
    • (2004) ACM CCS , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 10
    • 2942625823 scopus 로고    scopus 로고
    • Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Henrici, D., Müller, P. (eds.) PerSec 2004, pp. 149-153. IEEE Computer Society, New York (2004)
    • Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Henrici, D., Müller, P. (eds.) PerSec 2004, pp. 149-153. IEEE Computer Society, New York (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.