메뉴 건너뛰기




Volumn 31, Issue 4, 2009, Pages 812-815

A hybrid approach for privacy-preserving RFID tags

Author keywords

Authentication; Identification; Privacy; RFID; Security

Indexed keywords

CHALLENGE RESPONSE; CRYPTOGRAPHIC OPERATIONS; HYBRID APPROACHES; IDENTIFICATION; INFORMATION LEAKAGES; MUTUAL AUTHENTICATIONS; PRIVACY; PRIVACY-PRESERVING; RF-ID TAGS; RFID; RFID SYSTEMS; SECURITY; UNTRACEABILITY;

EID: 64249137046     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.09.001     Document Type: Article
Times cited : (23)

References (17)
  • 2
    • 26444443915 scopus 로고    scopus 로고
    • A scalable and provably secure hash based RFID protocol
    • Proceedings of Pervasive Computing and Communication Security (PerSec 2005)
    • Avoine G., and Oechslin P. A scalable and provably secure hash based RFID protocol. Proceedings of Pervasive Computing and Communication Security (PerSec 2005). IEEE Computer Society (2005) 110-114
    • (2005) IEEE Computer Society , pp. 110-114
    • Avoine, G.1    Oechslin, P.2
  • 3
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • IEEE Prss
    • Dimitriou T. A lightweight RFID protocol to protect against traceability and cloning attacks. Proceedings of SECURECOMM'05 (2005), IEEE Prss 59-66
    • (2005) Proceedings of SECURECOMM'05 , pp. 59-66
    • Dimitriou, T.1
  • 9
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers
    • IEEE Computer Society
    • Henrici D., and Muller P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. Proceedings of Pervasive Computing and Communications Security (PerSec 2004) (2004), IEEE Computer Society 149-153
    • (2004) Proceedings of Pervasive Computing and Communications Security (PerSec 2004) , pp. 149-153
    • Henrici, D.1    Muller, P.2
  • 11
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: a research survey
    • IEEE Press
    • Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications vol. 24(2) (2006), IEEE Press 381-394
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 2 , pp. 381-394
    • Juels, A.1
  • 14
    • 0003614758 scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorization
    • MIT, Cambridge, MA, USA
    • Rabin M. Digitalized signatures and public-key functions as intractable as factorization. Technical report (1979), MIT, Cambridge, MA, USA
    • (1979) Technical report
    • Rabin, M.1
  • 16
    • 84948964832 scopus 로고
    • Memory efficient variants of public-key schemes for smart card applications
    • Springer-Verlag
    • Shamir A. Memory efficient variants of public-key schemes for smart card applications. Proceedings of EUROCRYPT '94, LNCS 950 (1995), Springer-Verlag 445-449
    • (1995) Proceedings of EUROCRYPT '94, LNCS 950 , pp. 445-449
    • Shamir, A.1
  • 17
    • 50249161524 scopus 로고    scopus 로고
    • SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices such as RFID tags
    • Proceedings of FSE, Springer-Verlag GmbH, To Appear
    • A. Shamir, SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices such as RFID tags. In Proceedings of FSE 2008, Lecture Notes in Computer Science. Springer-Verlag GmbH, To Appear.
    • (2008) Lecture Notes in Computer Science
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.