메뉴 건너뛰기




Volumn , Issue , 2008, Pages 568-573

Security of an RFID protocol for supply chains

Author keywords

[No Author keywords available]

Indexed keywords

MUTUAL AUTHENTICATIONS; RFID AUTHENTICATIONS; RFID PROTOCOLS; SECURITY REQUIREMENTS; SHORT-COMINGS; SUPPLY CHAIN PARTNERS; UNLINKABILITY;

EID: 58149094596     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEBE.2008.44     Document Type: Conference Paper
Times cited : (15)

References (22)
  • 1
    • 38149037913 scopus 로고    scopus 로고
    • Passive attacks on a class of authentication protocols for RFID
    • B. Alomair, L. Lazos, and R. Poovendran. Passive attacks on a class of authentication protocols for RFID. In ICISC, pages 102-115, 2007.
    • (2007) ICISC , pp. 102-115
    • Alomair, B.1    Lazos, L.2    Poovendran, R.3
  • 2
    • 33744939250 scopus 로고    scopus 로고
    • Adversary model for radio frequency identification
    • Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL, Security and Cryptography Laboratory LASEC, Lausanne, Switzerland, September
    • G. Avoine. Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, September 2005.
    • (2005)
    • Avoine, G.1
  • 3
    • 33646036428 scopus 로고    scopus 로고
    • Limits of the cryptographic realization of Dolev-Yao-style XOR
    • M. Backes and B. Pfitzmann. Limits of the cryptographic realization of Dolev-Yao-style XOR. In ESORICS, pages 178-196, 2005.
    • (2005) ESORICS , pp. 178-196
    • Backes, M.1    Pfitzmann, B.2
  • 4
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • February
    • H.-Y. Chien and C.-H. Chen. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standars & Interfaces, Elsevier Science Publishers, 29(2):254-259, February 2007.
    • (2007) Computer Standars & Interfaces, Elsevier Science Publishers , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 5
    • 38149091047 scopus 로고    scopus 로고
    • A lightweight RFID protocol using substring
    • H.-Y. Chien and C.-W. Huang. A lightweight RFID protocol using substring. In EUC, pages 422-431, 2007.
    • (2007) EUC , pp. 422-431
    • Chien, H.-Y.1    Huang, C.-W.2
  • 6
    • 34547696859 scopus 로고    scopus 로고
    • Cryptanalysis of two lightweight RFID authentication schemes
    • B. Defend, K. Fu, and A. Juels. Cryptanalysis of two lightweight RFID authentication schemes. In PerCom Workshops, pages 211-216, 2007.
    • (2007) PerCom Workshops , pp. 211-216
    • Defend, B.1    Fu, K.2    Juels, A.3
  • 7
    • 44649113207 scopus 로고    scopus 로고
    • Untraceability of RFID protocols
    • Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, of, Seville, Spain, Springer
    • T. v. Deursen, S. Mauw, and S. Radomirović. Untraceability of RFID protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, volume 5019 of Lecture Notes in Computer Science, pages 1-15, Seville, Spain, 2008. Springer.
    • (2008) Lecture Notes in Computer Science , vol.5019 , pp. 1-15
    • Deursen, T.V.1    Mauw, S.2    Radomirović, S.3
  • 8
    • 58149087444 scopus 로고    scopus 로고
    • T. v. Deursen and S. Radomirovic. Attacks on RFID protocols version 1.0, Cryptology ePrint Archive, Report 2008/310, July 2008
    • T. v. Deursen and S. Radomirovic. Attacks on RFID protocols (version 1.0). Cryptology ePrint Archive, Report 2008/310, July 2008.
  • 9
    • 38049010942 scopus 로고    scopus 로고
    • Information confinement, privacy, and security in RFID systems
    • R. Di Pietro and R. Molva. Information confinement, privacy, and security in RFID systems. In ESORICS, pages 187-202, 2007.
    • (2007) ESORICS , pp. 187-202
    • Di Pietro, R.1    Molva, R.2
  • 10
    • 38149047468 scopus 로고    scopus 로고
    • Low-cost and strong-security RFID authentication protocol
    • J. Ha, S.-J. Moon, J. M. G. Nieto, and C. Boyd. Low-cost and strong-security RFID authentication protocol. In EUC Workshops, pages 795-807, 2007.
    • (2007) EUC Workshops , pp. 795-807
    • Ha, J.1    Moon, S.-J.2    Nieto, J.M.G.3    Boyd, C.4
  • 11
    • 38549103545 scopus 로고    scopus 로고
    • Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)
    • J. Ha, S.-J. Moon, J. M. G. Nieto, and C. Boyd. Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP). In PAKDD Workshops, pages 574-583, 2007.
    • (2007) PAKDD Workshops , pp. 574-583
    • Ha, J.1    Moon, S.-J.2    Nieto, J.M.G.3    Boyd, C.4
  • 12
    • 34547687590 scopus 로고    scopus 로고
    • Defining strong privacy for RFID
    • A. Juels and S. A. Weis. Defining strong privacy for RFID. In PerCom Workshops, pages 342-347, 2007.
    • (2007) PerCom Workshops , pp. 342-347
    • Juels, A.1    Weis, S.A.2
  • 13
    • 58149100777 scopus 로고    scopus 로고
    • Secure mobile RFID system against privacy and security problems
    • I. J. Kim, E. Y. Choi, and D. H. Lee. Secure mobile RFID system against privacy and security problems. In SecPerU 2007, 2007.
    • (2007) SecPerU 2007
    • Kim, I.J.1    Choi, E.Y.2    Lee, D.H.3
  • 14
    • 57849147967 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • Sandton, Gauteng, South Africa, May, IFIP
    • T. Li and G. Wang. Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP SEC 2007, Sandton, Gauteng, South Africa, May 2007. IFIP.
    • (2007) IFIP SEC 2007
    • Li, T.1    Wang, G.2
  • 15
    • 34748921704 scopus 로고    scopus 로고
    • Protecting RFID communications in supply chains
    • Y. Li and X. Ding. Protecting RFID communications in supply chains. In ASIACCS, pages 234-241, 2007.
    • (2007) ASIACCS , pp. 234-241
    • Li, Y.1    Ding, X.2
  • 16
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • G. Lowe. A hierarchy of authentication specifications. In CSFW, pages 31-44, 1997.
    • (1997) CSFW , pp. 31-44
    • Lowe, G.1
  • 17
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, dele-gatable pseudonym protocol enabling ownership transfer of RFID tags
    • D. Molnar, A. Soppera, and D. Wagner. A scalable, dele-gatable pseudonym protocol enabling ownership transfer of RFID tags. In Selected Areas in Cryptography, pages 276-290, 2005.
    • (2005) Selected Areas in Cryptography , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 18
    • 38349066494 scopus 로고    scopus 로고
    • An efficient and secure RFID security method with ownership transfer
    • K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi. An efficient and secure RFID security method with ownership transfer. In CIS, pages 778-787, 2006.
    • (2006) CIS , pp. 778-787
    • Osaka, K.1    Takagi, T.2    Yamazaki, K.3    Takahashi, O.4
  • 20
    • 33744928896 scopus 로고    scopus 로고
    • Reassignment scheme of an RFID tag's key for owner transfer
    • J. Saito, K. Imamoto, and K. Sakurai. Reassignment scheme of an RFID tag's key for owner transfer. In EUC Workshops, pages 1303-1312, 2005.
    • (2005) EUC Workshops , pp. 1303-1312
    • Saito, J.1    Imamoto, K.2    Sakurai, K.3
  • 21
    • 56749103027 scopus 로고    scopus 로고
    • RFID authentication protocol for low-cost tags
    • B. Song and C. J. Mitchell. RFID authentication protocol for low-cost tags. In WISEC, pages 140-147, 2008.
    • (2008) WISEC , pp. 140-147
    • Song, B.1    Mitchell, C.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.