메뉴 건너뛰기




Volumn , Issue , 2006, Pages

A lightweight secure solution for RFID

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK CIPHERS; LINEAR CONGRUENTIAL GENERATOR (LCG); RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS; SHARED RADIO MEDIUM; TAGGED OBJECTS;

EID: 50949106590     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2006.288     Document Type: Conference Paper
Times cited : (4)

References (12)
  • 1
    • 33646943487 scopus 로고    scopus 로고
    • Security and Privacy in RFID and Applications in Telemedicine
    • Apr
    • Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine", IEEE Comm. Mag., Apr., 2006, pp. 64-72.
    • (2006) IEEE Comm. Mag , pp. 64-72
    • Xiao, Y.1    Shen, X.2    Sun, B.3    Cai, L.4
  • 2
    • 18744409344 scopus 로고    scopus 로고
    • The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy
    • Washington D.C
    • A. Juels, R. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy", ACM CCS'03, Washington D.C., 2003, pp. 103-111.
    • (2003) ACM CCS'03 , pp. 103-111
    • Juels, A.1    Rivest, R.2    Szydlo, M.3
  • 4
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and Security in Library RFID Issues, Practices, and Architectures
    • Washington DC
    • D. Molnar, and D. Wagner, "Privacy and Security in Library RFID Issues, Practices, and Architectures", ACM CCS'04, Washington DC, 2004, pp. 210-219.
    • (2004) ACM CCS'04 , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 7
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-key Cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems," Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 9
    • 0020271558 scopus 로고    scopus 로고
    • J.P. Plumstead (Boyar), Inferring a Sequence Generated by a Linear Congruence, 23rd Annual IEEE Symposium on the Foundations of Computer Science, pp. 153-159, 1982.
    • J.P. Plumstead (Boyar), "Inferring a Sequence Generated by a Linear Congruence," 23rd Annual IEEE Symposium on the Foundations of Computer Science, pp. 153-159, 1982.
  • 10
    • 0021819410 scopus 로고
    • Deciphering a Linear Congruential Encryption
    • Jan
    • D.E. Knuth, "Deciphering a Linear Congruential Encryption," IEEE Tran. on Information Theory, vol. 31, no. 1, pp. 49-52, Jan. 1985.
    • (1985) IEEE Tran. on Information Theory , vol.31 , Issue.1 , pp. 49-52
    • Knuth, D.E.1
  • 11
    • 33144466214 scopus 로고    scopus 로고
    • RFID Privacy Using User-Controllable Uniqueness
    • MIT, MA, USA, Nov
    • S. Inoue and H. Yasuura, "RFID Privacy Using User-Controllable Uniqueness," RFID Privacy Workshop, MIT, MA, USA, Nov. 2003.
    • (2003) RFID Privacy Workshop
    • Inoue, S.1    Yasuura, H.2
  • 12
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Security in Pervasive Computing, of
    • S.A. Weis, S.E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing, vol. 2802 of LNCS, pp. 201-212, 2004.
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.