메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 482-487

An analysis of RFID tag authentication protocols using secret value

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; AUTOMATION; CRYPTOGRAPHY; RADIO WAVES;

EID: 52249124172     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/fgcn.2007.55     Document Type: Conference Paper
Times cited : (5)

References (10)
  • 2
    • 52249124459 scopus 로고    scopus 로고
    • EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Conformance Requirements Specification v. 1.0.2, EPCglobal Inc, February 2005
    • "EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Conformance Requirements Specification v. 1.0.2", EPCglobal Inc, February 2005
  • 3
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • T. Dimitriou, "A lightweight RFID protocol to protect against traceability and cloning attacks", In Proc. of SECURECOMM'05, 2005.
    • (2005) Proc. of SECURECOMM'05
    • Dimitriou, T.1
  • 8
    • 33745761701 scopus 로고    scopus 로고
    • Scalable and Flexible Privacy Protection Scheme for RFID Systems
    • European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS'05, Springer
    • S. Yeo, S. Kim, "Scalable and Flexible Privacy Protection Scheme for RFID Systems", European Workshop on Security and Privacy in Ad hoc and Sensor Networks - ESAS'05, LNCS, Springer, vol.3813, pp.153-163.
    • LNCS , vol.3813 , pp. 153-163
    • Yeo, S.1    Kim, S.2
  • 9
    • 36248973644 scopus 로고    scopus 로고
    • Cryptanalysis of Two Lightweight RFID Authentication Schemes
    • March
    • B. Defend, K. Fu and A. Juels. "Cryptanalysis of Two Lightweight RFID Authentication Schemes." In: Proc. of PERSEC07, March 2007.
    • (2007) Proc. of PERSEC07
    • Defend, B.1    Fu, K.2    Juels, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.