메뉴 건너뛰기




Volumn , Issue , 2008, Pages

RFIDDOT: RFID delegation and ownership transfer made simple

Author keywords

Delegation; Forward and backward security; Ownership transfer; RFID security and privacy

Indexed keywords

DELEGATION; DESYNCHRONIZATION; FORWARD AND BACKWARD SECURITY; OWNERSHIP TRANSFER; RF-ID TAGS; RFID SECURITY AND PRIVACY; TAGGED PRODUCTS; USER HABIT; USER PRIVACY;

EID: 70249087379     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1460877.1460921     Document Type: Conference Paper
Times cited : (46)

References (25)
  • 1
    • 0001853125 scopus 로고
    • Scientific American, Jan
    • Mark Weiser, "The computer of the 21st century," in Scientific American, Jan, 265(3), pp. 94-104, 1992.
    • (1992) The computer of the 21st century , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 6
    • 33750046702 scopus 로고    scopus 로고
    • 8-bit microcontroller system with area efficient AES coprocessor for transponder applications
    • M. Jung, H. Fiedler, and R. Lerch. "8-bit microcontroller system with area efficient AES coprocessor for transponder applications," In Ecrypt Workshop on RFID and Lightweight Crypto, 2005.
    • (2005) Ecrypt Workshop on RFID and Lightweight Crypto
    • Jung, M.1    Fiedler, H.2    Lerch, R.3
  • 7
    • 70249106292 scopus 로고    scopus 로고
    • M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. AES Implementation on a grain of sand, In Information Security, IEE proceedings, 152(1):13-20, October 2005.
    • M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. "AES Implementation on a grain of sand," In Information Security, IEE proceedings, 152(1):13-20, October 2005.
  • 8
    • 70249111403 scopus 로고    scopus 로고
    • Energy comparison of AES and SHA-1 for ubiquitous computing
    • P. Kaps and B. Sunar, "Energy comparison of AES and SHA-1 for ubiquitous computing," In EUCŠ06.
    • EUCŠ06
    • Kaps, P.1    Sunar, B.2
  • 10
    • 70249119906 scopus 로고    scopus 로고
    • David Molnar, Andrea Soppera and David Wagner, A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags, in SAC, 2005.
    • David Molnar, Andrea Soppera and David Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags," in SAC, 2005.
  • 13
    • 0348167857 scopus 로고    scopus 로고
    • Roy Want. RFID: A Key to Automating Everything, In Scientific American, Jan, 290(1), pp. 56-65, 2004 1.
    • Roy Want. "RFID: A Key to Automating Everything," In Scientific American, Jan, 290(1), pp. 56-65, 2004 1.
  • 14
    • 70249126818 scopus 로고    scopus 로고
    • Nokia unveils RFID phone reader, IN RFID Journal, 17 March 2004. http://www.rfidjournal.com/article/view/834.
    • "Nokia unveils RFID phone reader," IN RFID Journal, 17 March 2004. http://www.rfidjournal.com/article/view/834.
  • 15
    • 70249112526 scopus 로고    scopus 로고
    • http://www.nfc-forum.org
  • 16
    • 14844290165 scopus 로고    scopus 로고
    • Enhancing RFID privacy through antenna energy analysis
    • Kenneth Fishkin and Sumit Roy, "Enhancing RFID privacy through antenna energy analysis," In MIT RFID Privacy Workshop, 2003.
    • (2003) MIT RFID Privacy Workshop
    • Fishkin, K.1    Roy, S.2
  • 19
    • 33744957484 scopus 로고    scopus 로고
    • Adversary Model for Radio Frequency Identification
    • Gildas Avoine. "Adversary Model for Radio Frequency Identification," in Cryptology ePrint archive, www.iacr.org
    • Cryptology ePrint archive
    • Avoine, G.1
  • 20
    • 70249125705 scopus 로고    scopus 로고
    • Ivan Damgård and Michael Østergaard Pedersen. RFID Security: Tradeoffs between Security and Efficiency, in Cryptology ePrint archive, www.iacr.org, July 2006.
    • Ivan Damgård and Michael Østergaard Pedersen. "RFID Security: Tradeoffs between Security and Efficiency," in Cryptology ePrint archive, www.iacr.org, July 2006.
  • 21
    • 35248891000 scopus 로고    scopus 로고
    • Forward Security in Private-Key Cryptography
    • Topics in Cryptology-CT-RSA 03, M. Joye ed, Springer-Verlag
    • Mihir Bellare and Bennet Yee. "Forward Security in Private-Key Cryptography", in Topics in Cryptology-CT-RSA 03, Lecture Notes in Computer Science Vol. 2612, M. Joye ed., Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2612
    • Bellare, M.1    Yee, B.2
  • 25
    • 26444435642 scopus 로고    scopus 로고
    • RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management
    • Australasian Conference on information Security and Privacy, ACISP 2005, of, July
    • M. Rieback, B. Crispo, and A. Tanenbaum, "RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management," in Australasian Conference on information Security and Privacy - ACISP 2005, vol. 3574 of LNCS, pp. 184-194, July 2005.
    • (2005) LNCS , vol.3574 , pp. 184-194
    • Rieback, M.1    Crispo, B.2    Tanenbaum, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.