메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Group-based private authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SCHEMES; PRIVATE AUTHENTICATIONS; RESOURCE-CONSTRAINED; RFID SYSTEMS; RFID TAGS; SYMMETRICKEY CRYPTOGRAPHIES;

EID: 47749092385     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WOWMOM.2007.4351808     Document Type: Conference Paper
Times cited : (37)

References (7)
  • 1
    • 33745621564 scopus 로고    scopus 로고
    • Reducing time complexity in RFID systems
    • B. Preneel and S. Tavares Eds, Selected Areas in Cryptography, Springer
    • G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In B. Preneel and S. Tavares (Eds.), Selected Areas in Cryptography, Springer, LNCS 3897, pp 291-306, 2005.
    • (2005) LNCS , vol.3897 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 2
    • 52449113611 scopus 로고    scopus 로고
    • Optimal key-trees for tree-based private authentication
    • G. Danezis and P. Golle Eds, Privacy Enhancing Technologies, Springer
    • L. Buttyan, T. Holczer, and I. Vajda. Optimal key-trees for tree-based private authentication. In G. Danezis and P. Golle (Eds.), Privacy Enhancing Technologies, Springer, LNCS 4258, pp. 332-350, 2006.
    • (2006) LNCS , vol.4258 , pp. 332-350
    • Buttyan, L.1    Holczer, T.2    Vajda, I.3
  • 3
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional sender and recipient untraceability
    • D. Chaum. The Dining Cryptographers Problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 4
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • R. Dingledine and P. Syverson Eds, Designing Privacy Enhancing Technologies
    • C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson (Eds.), Designing Privacy Enhancing Technologies, Springer LNCS 2482, pp. 54-68, 2002.
    • (2002) Springer LNCS , vol.2482 , pp. 54-68
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 6
    • 84940024494 scopus 로고    scopus 로고
    • Quantifying Information Leakage in Tree-Based Hash Protocols
    • Proceedings of the Conference on Information and Communications Security
    • K. Nohl and D. Evans. Quantifying Information Leakage in Tree-Based Hash Protocols. In Proceedings of the Conference on Information and Communications Security, Springer LNCS 4307, pp. 228-237, 2006.
    • (2006) Springer LNCS , vol.4307 , pp. 228-237
    • Nohl, K.1    Evans, D.2
  • 7
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • Proceedings of the Privacy Enhancing Technologies (PET) Workshop
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of the Privacy Enhancing Technologies (PET) Workshop, Springer LNCS 2482, pp. 41-53, 2002.
    • (2002) Springer LNCS , vol.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.