메뉴 건너뛰기




Volumn , Issue , 2007, Pages 61-66

Storage-awareness: RFID private authentication based on sparse tree

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; BALANCED TREES; PRIVACY PROTECTIONS; PRIVATE AUTHENTICATIONS; PRIVATE INFORMATIONS; RADIO FREQUENCY IDENTIFICATION TECHNOLOGIES; RFID SYSTEMS; SEARCH COMPLEXITIES; TREE STRUCTURES; UBIQUITOUS COMPUTING ENVIRONMENTS;

EID: 47649131906     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPERU.2007.13     Document Type: Conference Paper
Times cited : (15)

References (14)
  • 2
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial Model for Radio Frequency Identification
    • G. Avoine, "Adversarial Model for Radio Frequency Identification," in Cryptology ePrint Archive, 2005.
    • (2005) Cryptology ePrint Archive
    • Avoine, G.1
  • 3
    • 34547626956 scopus 로고    scopus 로고
    • A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks
    • T. Dimitriou, "A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks," in Proceedings of SecureComm, 2005.
    • (2005) Proceedings of SecureComm
    • Dimitriou, T.1
  • 4
    • 33750353849 scopus 로고    scopus 로고
    • A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete
    • T. Dimitriou, "A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete," in Proceedings of IEEE PerCom, 2006.
    • (2006) Proceedings of IEEE PerCom
    • Dimitriou, T.1
  • 6
    • 20844453821 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • A. Juels, "Minimalist cryptography for low-cost RFID tags," in Proceedings of SCN, 2004.
    • (2004) Proceedings of SCN
    • Juels, A.1
  • 8
    • 34547617482 scopus 로고    scopus 로고
    • Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
    • L. Lu, J. Han, L. Hu, Y. Liu, and L. M. Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems," in Proceedings of IEEE PerCom, 2007.
    • (2007) Proceedings of IEEE PerCom
    • Lu, L.1    Han, J.2    Hu, L.3    Liu, Y.4    Ni, L.M.5
  • 9
    • 34548180384 scopus 로고    scopus 로고
    • A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
    • D. Molnar, A. Soppera, D. Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags," in Proceedings of SAC, 2005.
    • (2005) Proceedings of SAC
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 10
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and Security in Library RFID: Issues, Practices, and Structures
    • D. Molnar, D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Structures," in Proceedings of ACM CCS, 2004
    • (2004) Proceedings of ACM CCS
    • Molnar, D.1    Wagner, D.2
  • 12
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • S. Weis, S. Sarma, R. Rivest, D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems" in Proceedings of SPC, 2003.
    • (2003) Proceedings of SPC
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 14
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • M. Bellare, P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," in Proceedings of ACM CCS, 1993.
    • (1993) Proceedings of ACM CCS
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.