메뉴 건너뛰기




Volumn 2, Issue 6, 2007, Pages 6-13

A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags

Author keywords

Intermittent connectivity; Ownership transfer; Privacy; RFID; Scalabilty; Time limited delegation

Indexed keywords

INTERMITTENT CONNECTIVITY; LATENCY PROBLEM; ONLINE DATABASE; OWNERSHIP TRANSFER; PRIVACY CONCERNS; PRIVACY PROTECTING; RF-ID TAGS; SCALABILTY; TAG IDENTIFICATION; TIME-LIMITED DELEGATION;

EID: 59249097693     PISSN: 17962021     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (39)

References (19)
  • 6
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and privacy: A research survey
    • February 2006
    • A. Juels, "RFID Security and privacy: A research survey," IEEE JSAC, vol. 24, no. 2, pp. 381-394, February 2006
    • IEEE JSAC , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 7
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based Enhancement of Location Privacy for Radio Frequency Identification Devices using Varying Identifiers
    • March 2004
    • D. Henrici and P. Muller, "Hash-based Enhancement of Location Privacy for Radio Frequency Identification Devices using Varying Identifiers," in proceedings of IEEE PerSec'04, March 2004
    • Proceedings of IEEE PerSec'04
    • Henrici, D.1    Muller, P.2
  • 9
    • 33750290259 scopus 로고    scopus 로고
    • YA-TRAP: Yet Another Trivial RFID Authentication Protocol
    • March 2006
    • G. Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol," in proceedings of IEEE PerCom'06, March 2006
    • Proceedings of IEEE PerCom'06
    • Tsudik, G.1
  • 10
    • 33745597876 scopus 로고    scopus 로고
    • A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
    • August 2005
    • D. Molnar, A. Soppera and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags," in proceedings of SAC'05, August 2005
    • Proceedings of SAC'05
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 14
  • 15
    • 33746739905 scopus 로고    scopus 로고
    • AES Implementation on a grain of sand," Information Security
    • October 2005
    • M. Feldhofer, J. Wolkerstorfer and V. Rijmen, "AES Implementation on a grain of sand," Information Security, IEE proceedings, vol. 152, no. 1, pp. 13-20, October 2005
    • IEE Proceedings , vol.152 , Issue.1 , pp. 13-20
    • Feldhofer, M.1    Wolkerstorfer, J.2    Rijmen, V.3
  • 16
    • 84866631309 scopus 로고    scopus 로고
    • Energy comparison of AES and SHA-1 for ubiquitous computing
    • December 2006
    • P. Kaps and B. Sunar, "Energy comparison of AES and SHA-1 for ubiquitous computing," in proceedings of EUC'06, December 2006
    • Proceedings of EUC'06
    • Kaps, P.1    Suna, B.2
  • 18
    • 38149056913 scopus 로고    scopus 로고
    • Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
    • December 2006
    • C. H. Lim and T. Kwon, "Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer," in proceedings of ICICS'06, December 2006
    • Proceedings of ICICS'06
    • Lim, C.H.1    Kwon, T.2
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.