메뉴 건너뛰기




Volumn , Issue , 2006, Pages 2058-2064

Confronting security and privacy threats in modern RFID systems

Author keywords

[No Author keywords available]

Indexed keywords

LOW COSTS; RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS; RFID TECHNOLOGY (CO); SECURITY AND PRIVACY; SECURITY MODELING; TECHNOLOGICAL ASPECTS;

EID: 47049103630     PISSN: 10586393     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSSC.2006.355129     Document Type: Conference Paper
Times cited : (14)

References (27)
  • 2
    • 47049124708 scopus 로고    scopus 로고
    • EPCglobal Inc. home
    • EPCglobal Inc. home page, http://www.epcglobalinc.org.
  • 3
    • 84897458412 scopus 로고    scopus 로고
    • EPCglobal Inc
    • EPCglobal Inc., Specification for RFID air interface, http://www.epcglobalinc.org/standards_technology/ EPCglobal2UHFRFIDProtocolV109122005
    • Specification for RFID air interface
  • 7
    • 34547645950 scopus 로고    scopus 로고
    • Power analysis of RFID Tags
    • unpublished, accessed on March
    • Y. Oren, and A. Shamir, "Power analysis of RFID Tags", unpublished, accessed on March 2006, http://www.wisdom.weizmann.ac.il/~yossio/ rfid/.
    • (2006)
    • Oren, Y.1    Shamir, A.2
  • 9
    • 68549104046 scopus 로고    scopus 로고
    • Physical security devices for computer subsystems: A Survey of Attacks and Defences. Workshop on Cryptographic Hardware and Embedded Systems
    • Weigart, S.H., "Physical security devices for computer subsystems: A Survey of Attacks and Defences". Workshop on Cryptographic Hardware and Embedded Systems, LNCS, vol. 1965, pages 302-317.
    • LNCS , vol.1965 , pp. 302-317
    • Weigart, S.H.1
  • 10
    • 0000694402 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • International Workshop on Security Protocols
    • Andreson, R, and Kuhn, M., "Low cost attacks on tamper resistant devices", International Workshop on Security Protocols, LNCS, 1997.
    • (1997) LNCS
    • Andreson, R.1    Kuhn, M.2
  • 11
    • 47049096978 scopus 로고    scopus 로고
    • invited talk on smartcard security
    • E Bovenlander, invited talk on smartcard security, Eurocrypt 97, 1997.
    • (1997) Eurocrypt , vol.97
    • Bovenlander, E.1
  • 15
    • 0037952426 scopus 로고    scopus 로고
    • Physical one-way functions
    • Ph.D dissertation, Department of Media and Art Science, Massachusetts Institute of Technology, Cambridge
    • P. S. Ravikanth "Physical one-way functions", Ph.D dissertation, Department of Media and Art Science, Massachusetts Institute of Technology, Cambridge, 2001.
    • (2001)
    • Ravikanth, P.S.1
  • 19
    • 84974670663 scopus 로고
    • The shrinking generator
    • D.R. Stinson, editor, Springer-Verlag, New York
    • Coppersmith, H. Krawczyk, and Y. Mansour, "The shrinking generator", D.R. Stinson, editor, Advances in Crytplogy - Crypto '93, pp 22-39, Springer-Verlag, New York, 1994.
    • (1994) Advances in Crytplogy - Crypto '93 , pp. 22-39
    • Coppersmith, H.K.1    Mansour, Y.2
  • 20
    • 84956857565 scopus 로고    scopus 로고
    • A probabilistic correlation attack on the shrinking generator
    • Proc. ACISP '98, 1438, pp, Springer Verlat
    • L. Simpson, J.D. Golic, and E. Dawson, "A probabilistic correlation attack on the shrinking generator," Proc. ACISP '98, LNCS vol. 1438, pp. 147-158, Springer Verlat, 1998.
    • (1998) LNCS , pp. 147-158
    • Simpson, L.1    Golic, J.D.2    Dawson, E.3
  • 21
    • 84955620884 scopus 로고
    • A cryptanalysis of clock-controlled shift registers with multiple steps
    • J. D. Golic and L. O'Connor, "A cryptanalysis of clock-controlled shift registers with multiple steps", Cryptography: Policy and Algorithms, pp. 174-184, 1995.
    • (1995) Cryptography: Policy and Algorithms , pp. 174-184
    • Golic, J.D.1    O'Connor, L.2
  • 22
    • 84947776392 scopus 로고    scopus 로고
    • Reduces complexity correlation attacks on two clock-controlled generators
    • Proc. Asiacrypt'98, 1541, pp, Springer-Verlag
    • T. Johansson, "Reduces complexity correlation attacks on two clock-controlled generators," Proc. Asiacrypt'98, LNCS, vol 1541, pp. 342-356, Springer-Verlag, 1998.
    • (1998) LNCS , pp. 342-356
    • Johansson, T.1
  • 23
    • 35248859228 scopus 로고    scopus 로고
    • Predicting the shrinking generator with fixed connections
    • proc. Eurocrypt'03, Springer Verlag
    • P. Ekdahl, W. Meier, and T. Johansson, "Predicting the shrinking generator with fixed connections," proc. Eurocrypt'03, LNCS, vol. 2656, pp. 345-359, Springer Verlag, 2004.
    • (2004) LNCS , vol.2656 , pp. 345-359
    • Ekdahl, P.1    Meier, W.2    Johansson, T.3
  • 24
    • 33646763858 scopus 로고    scopus 로고
    • Using linear hybrid cellular automata to attack the shrinking generator
    • May
    • P. Caballero-Gil, and A. Fuster-Sabater, "Using linear hybrid cellular automata to attack the shrinking generator", IEICE Trans. Fundamentals, vol. E90-A, no. 5, pp. 1166-1172, May 2006.
    • (2006) IEICE Trans. Fundamentals , vol.E90-A , Issue.5 , pp. 1166-1172
    • Caballero-Gil, P.1    Fuster-Sabater, A.2
  • 25
    • 47049093398 scopus 로고    scopus 로고
    • Buffer length and clock rate for the shrinking generator
    • RC 19938 88322, 1995
    • I. Kessler, and H. Krawczyk, "Buffer length and clock rate for the shrinking generator", IBM Research Report, RC 19938 (88322), 1995.
    • IBM Research Report
    • Kessler, I.1    Krawczyk, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.