메뉴 건너뛰기




Volumn 24, Issue 2, 2009, Pages 309-318

A secure elliptic curve-based RFID protocol

Author keywords

Elliptic curve cryptography; Forward security; RFID; Zero knowledge

Indexed keywords

ELLIPTIC CURVE CRYPTOGRAPHY; ELLIPTIC CURVES; FORWARD SECURITY; FORWARD-SECURE; HIGH CONFIDENCES; POTENTIAL USERS; PRIVACY PROBLEMS; RADIO FREQUENCY IDENTIFICATION SYSTEMS; RFID; RFID PROTOCOLS; SCALABILITY PROBLEMS; SCALABLE PROTOCOLS; ZERO KNOWLEDGE;

EID: 65249186388     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-009-9226-3     Document Type: Article
Times cited : (20)

References (21)
  • 1
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to "privacy-Friendly" tags
    • MIT, MA, USA, November
    • Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to "Privacy-Friendly" tags. In RFID Privacy Workshop, MIT, MA, USA, November 2003.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 3
    • 35248832722 scopus 로고    scopus 로고
    • Squealing euros: Privacy protection in RFID-enabled banknotes
    • Proc. Financial Cryptography (FC'03), Rebecca N Wright (ed.), Le Gosier, Guadeloupe, French West Indies, IFCA Springer-Verlag, January
    • Juels A, Pappu R. Squealing euros: Privacy protection in RFID-enabled banknotes. In Proc. Financial Cryptography (FC'03), Rebecca N Wright (ed.), Le Gosier, Guadeloupe, French West Indies, IFCA, LNCS 2742, Springer-Verlag, January 2003, pp.103-121.
    • (2003) LNCS , vol.2742 , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 7
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Proc. International Conference on Security in Pervasive Computing (SPC 2003), Hutter D, Müller G, Stephan W, Ullmann M (eds.) Boppard, Germany, Springer-Verlag, March
    • Weis S A, Sarma S E, Rivest R L, Engels D W. Security and privacy aspects of low-cost radio frequency identification systems. In Proc. International Conference on Security in Pervasive Computing (SPC 2003), Hutter D, Müller G, Stephan W, Ullmann M (eds.), LNCS 2802, Boppard, Germany, Springer-Verlag, March 2003, pp.454-469.
    • (2003) LNCS , vol.2802 , pp. 454-469
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 9
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • Pfitzmann B, Liu P (eds.), Washington DC, USA, ACM, ACM Press, October
    • Molnar D, Wagner D. Privacy and security in library RFID: Issues, practices, and architectures. In Proc. Conference on Computer and Communications Security (ACM CCS), Pfitzmann B, Liu P (eds.), Washington DC, USA, ACM, ACM Press, October 2004, pp.210-219.
    • (2004) Proc. Conference on Computer and Communications Security (ACM CCS) , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 10
  • 11
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Proc. Advances in Cryptology (CRYPTO'85) Springer
    • Miller V S. Use of elliptic curves in cryptography. In Proc. Advances in Cryptology (CRYPTO'85), LNCS 218, Springer, 1986, pp.417-426.
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 12
    • 84956869906 scopus 로고
    • Demonstrating possession of a discrete logarithm without revealing it
    • Santa Barbara, USA, August
    • David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta. Demonstrating possession of a discrete logarithm without revealing it. In Proc. Advances in Cryptology (CRYPTO'86), Santa Barbara, USA, August 1986, pp.200-212.
    • (1986) Proc. Advances in Cryptology (CRYPTO'86) , pp. 200-212
    • Chaum, D.1    Evertse, J.-H.2    De G.J.Van3    Peralta, R.4
  • 13
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C P Schnorr 1991 Efficient signature generation by smart cards Journal of Cryptology 4 3 161 174
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 17
    • 1642319117 scopus 로고    scopus 로고
    • SECG Standards for Efficient Cryptography Group, Certicom Corp., September
    • SECG. SEC 2: Recommended elliptic curve domain parameters. Standards for Efficient Cryptography Group, Certicom Corp., September 2000.
    • (2000) SEC 2: Recommended Elliptic Curve Domain Parameters
  • 20
    • 0016486496 scopus 로고
    • Theodore Gyle Lewis. Hash table methods
    • Douglas Maurer Ward 1975 Theodore Gyle Lewis. Hash table methods ACM Comput. Surv. 7 1 5 19
    • (1975) ACM Comput. Surv. , vol.7 , Issue.1 , pp. 5-19
    • Douglas Maurer, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.