메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 84-89

Quantifying information leakage in RFID systems

Author keywords

Cryptographic approach; Hash function; Information leakage; RFID

Indexed keywords

CRYPTOGRAPHIC APPROACH; HASH FUNCTION; INFORMATION LEAKAGE;

EID: 44249104264     PISSN: 17389445     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICACT.2008.4493717     Document Type: Conference Paper
Times cited : (3)

References (22)
  • 1
    • 44249108519 scopus 로고    scopus 로고
    • Benetton undercided on use of "smart tags",8
    • April
    • Associated Press, Benetton undercided on use of "smart tags",8 April 2003.
    • (2003) Associated Press
  • 4
    • 44249104167 scopus 로고    scopus 로고
    • Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daiel W. W Engels, Security and privacy aspects of low-cast radio frequency identification systems, first international Conference on Security in Pervasive Computing, 2003 hltp:// theory.lcs.mit.edu/sweis/spo-rfid.pdf
    • Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daiel W. W Engels, Security and privacy aspects of low-cast radio frequency identification systems," first international Conference on Security in Pervasive Computing, 2003 hltp:// theory.lcs.mit.edu/sweis/spo-rfid.pdf
  • 6
    • 35248872610 scopus 로고    scopus 로고
    • RFID systyems and security and privacy implications, CHES 2002
    • Springer-Verlag
    • S. E. Sarma, S. A. Weis, and D. W. Engels, RFID systyems and security and privacy implications, CHES 2002, LNCS 2523, pp454-469, Springer-Verlag, 2003
    • (2003) LNCS , vol.2523 , pp. 454-469
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 7
    • 2942614621 scopus 로고    scopus 로고
    • Security and privacy in radio-frequency identification devices, MS Thesis
    • May
    • S.A. Weis, Security and privacy in radio-frequency identification devices, MS Thesis, MIT, May 2003.
    • (2003) MIT
    • Weis, S.A.1
  • 8
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cast radio frequency identification systems
    • Security in Pervasive Computing 2003, Springer-Verlag
    • S.A. Weis, S.E. Sarma, R. L. Rivest, and D. W. Engels, Security and privacy aspects of low-cast radio frequency identification systems," Security in Pervasive Computing 2003, LNCS 2802, pp201-212, Springer-Verlag, 2004.
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 9
    • 44249094585 scopus 로고    scopus 로고
    • Nonidentifiable anonymous-ID scheme for RFID privacy protection
    • Shingo Kinosita, Fumitaka Hoshino, Tomoyuki Komuro, Akiko Fujimura and Miyako Ohkubo, Nonidentifiable anonymous-ID scheme for RFID privacy protection, CSS 2003 in Japanese.
    • Japanese , vol.CSS 2003
    • Kinosita, S.1    Hoshino, F.2    Komuro, T.3    Fujimura, A.4    Ohkubo, M.5
  • 10
    • 35248832722 scopus 로고    scopus 로고
    • Squealing Euros: Privacy protection in RFID-enabled banknotes, Financial cryptography'03
    • Springer-Verlag
    • A. Juels, R. Pappu, Squealing Euros: Privacy protection in RFID-enabled banknotes, Financial cryptography'03, LNCS 2742, pp103-121, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2742 , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 11
    • 33745771753 scopus 로고    scopus 로고
    • Noisy tags: A pretty good key exchange protocol for RFID tags
    • The 8th International Conference on Smart Card Research and Advanced Applications CARPIS, Tarragona, Spain, April 19-21, Springer-Verlag
    • Claude Castelluccia and Gildas Avoine, Noisy tags: A pretty good key exchange protocol for RFID tags, The 8th International Conference on Smart Card Research and Advanced Applications (CARPIS), Tarragona, Spain, April 19-21, 2006, LNCS, Springer-Verlag, 2006.
    • (2006) LNCS
    • Castelluccia, C.1    Avoine, G.2
  • 12
    • 2942593615 scopus 로고    scopus 로고
    • Radio-frequency identification systems, In processing of CHES'02
    • Springer-Verlag
    • Sanjay E. Sarma, Stephen A. Weis and Daiel W. Engels, Radio-frequency identification systems, In processing of CHES'02, pp454-469. Springer-Verlag, 2002. LNCS no.2523.
    • (2002) LNCS , vol.2523 , pp. 454-469
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 13
    • 18744409344 scopus 로고    scopus 로고
    • th ACM Conference on Computer and Communications Security (CCS 2003), Oct. 2003.
    • th ACM Conference on Computer and Communications Security (CCS 2003), Oct. 2003.
  • 14
    • 44249124193 scopus 로고    scopus 로고
    • Phillippe Golle, Markus Jakobsson, Ari Juels and P. Syverson, Universal re-encryption for mixnets, 2002, http://www.syverson.org/univrenc-ctrsa.pdf
    • Phillippe Golle, Markus Jakobsson, Ari Juels and P. Syverson, Universal re-encryption for mixnets, 2002, http://www.syverson.org/univrenc-ctrsa.pdf
  • 15
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial model for radio frequency identification, 2005. Cryptology ePrint Archive
    • Report 2005/049. Referenced at the
    • G. Avoine, Adversarial model for radio frequency identification, 2005. Cryptology ePrint Archive, Report 2005/049. Referenced 2006 at the http://eprint.iacr.org
    • (2006)
    • Avoine, G.1
  • 19
    • 14844293432 scopus 로고    scopus 로고
    • Cryptographic approach to "Privacy-Friendly" tags
    • MA, USA. November
    • Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, Cryptographic approach to "Privacy-Friendly" tags, RFID Privacy Workshop, MIT, MA, USA. November 2003.
    • (2003) RFID Privacy Workshop, MIT
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 22
    • 84940024494 scopus 로고    scopus 로고
    • Quantifying Information Leankage in Tree-Based Hash Protocols, ICICS 2006
    • Springer-Verlag Berlin Heidelberg
    • Karsten Nohl and David Evans, Quantifying Information Leankage in Tree-Based Hash Protocols, ICICS 2006, LNCS 4307, pp228-237, 2006, Springer-Verlag Berlin Heidelberg 2006.
    • (2006) LNCS , vol.4307 , pp. 228-237
    • Nohl, K.1    Evans, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.