메뉴 건너뛰기




Volumn , Issue , 2007, Pages 55-60

Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags

Author keywords

Grouping proofs; Privacy; RFID; Security; Tracking; Yooking proofs

Indexed keywords

GROUPING-PROOFS; PRIVACY; RFID; SECURITY; TRACKING; YOOKING-PROOFS;

EID: 47649132152     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPERU.2007.12     Document Type: Conference Paper
Times cited : (49)

References (17)
  • 2
    • 50249129624 scopus 로고    scopus 로고
    • Generalized "yooking proofs" for a group of RFID tags
    • L. Bolotnyy and G. Robins. Generalized "yooking proofs" for a group of RFID tags. In Poster of MOBIQUITOUS06, 2006.
    • (2006) Poster of MOBIQUITOUS06
    • Bolotnyy, L.1    Robins, G.2
  • 3
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proc. of SECURECOMM'05, 2005.
    • (2005) Proc. of SECURECOMM'05
    • Dimitriou, T.1
  • 4
    • 47649126635 scopus 로고    scopus 로고
    • Class-1 Generation-2 UHF air interface protocol standard version 1.0.9: Gen 2
    • Class-1 Generation-2 UHF air interface protocol standard version 1.0.9: "Gen 2". http://www.epcglobalinc.org/standards/.
  • 5
    • 85011285633 scopus 로고
    • The strict avalanche criterion: Spectral properties of boolean functions and an extended definition
    • Proc. of CRYPTO'88
    • R. Forré. The strict avalanche criterion: Spectral properties of boolean functions and an extended definition. In Proc. of CRYPTO'88, LNCS, pages 450-468, 1990.
    • (1990) LNCS , pp. 450-468
    • Forré, R.1
  • 6
    • 2942560605 scopus 로고    scopus 로고
    • Yoking-proofs for RFID tags
    • IEEE Computer Society, March
    • A. Juels. "Yoking-proofs" for RFID tags. In Proc. of PerSec'04, pages 138-143. IEEE Computer Society, March 2004.
    • (2004) Proc. of PerSec'04 , pp. 138-143
    • Juels, A.1
  • 7
    • 30344451754 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Manuscript
    • A. Juels. RFID security and privacy: A research survey. Manuscript, 2005.
    • (2005)
    • Juels, A.1
  • 8
    • 0012694899 scopus 로고
    • Evolving a computer program to generate random number using the genetic programming paradigm
    • J.R. Koza. Evolving a computer program to generate random number using the genetic programming paradigm. In Proc. of the 4th Int. Conference on GA, pages 37-44, 1991.
    • (1991) Proc. of the 4th Int. Conference on GA , pp. 37-44
    • Koza, J.R.1
  • 9
    • 85025704284 scopus 로고    scopus 로고
    • Linear cryptanalysis method for DES cipher
    • M. Matsui. Linear cryptanalysis method for DES cipher. In Proc. of EUROCRYPT'93, volume 1994, pages 386-397.
    • Proc. of EUROCRYPT'93 , vol.1994 , pp. 386-397
    • Matsui, M.1
  • 10
    • 33750291916 scopus 로고    scopus 로고
    • RFID systems: A survey on security threats and proposed solutions
    • Proc. of PWC06, of
    • P. Peris-Lopez, J. C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda. RFID systems: A survey on security threats and proposed solutions. In Proc. of PWC06, volume 4217 of LNCS, pages 159-170, 2006.
    • (2006) LNCS , vol.4217 , pp. 159-170
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 12
    • 47649103458 scopus 로고    scopus 로고
    • On existence proofs for multiple RFID tags
    • IEEE Computer Society Press
    • S. Piramuthu. On existence proofs for multiple RFID tags. In SecPerU'06. IEEE Computer Society Press, 2006.
    • (2006) SecPerU'06
    • Piramuthu, S.1
  • 13
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • doi:10.1016/j.dss.2007.01.003
    • S. Piramuthu. Protocols for RFID tag/reader authentication. Decision Support Systems, page doi:10.1016/j.dss.2007.01.003, 2007.
    • (2007) Decision Support Systems, page
    • Piramuthu, S.1
  • 14
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Proc. of SPC'05, of
    • K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-response based RFID authentication protocol for distributed database environment. In Proc. of SPC'05, volume 3450 of LNCS, pages 70-84, 2005.
    • (2005) LNCS , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 16
    • 47649116556 scopus 로고    scopus 로고
    • F.-X. Standaert, G. Piret, and J.-J. Quisquater. Cryptanalysis of block ciphers: A survey. Technical report
    • F.-X. Standaert, G. Piret, and J.-J. Quisquater. Cryptanalysis of block ciphers: A survey. Technical report.
  • 17
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • September
    • M. Weiser. The computer for the 21st century. Scientific American, 265(3):94-104, September 1991.
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.