메뉴 건너뛰기




Volumn , Issue , 2008, Pages 292-299

Mutual authentication in RFID: Security and privacy

Author keywords

Identification protocol; Privacy; RFID

Indexed keywords

BASIC PROTOCOLS; IDENTIFICATION PROTOCOL; MUTUAL AUTHENTICATION; PSEUDO-RANDOM FUNCTIONS; RANDOM ORACLE; RFID PROTOCOLS; SECURE PROTOCOLS; SECURITY AND PRIVACY; SEVERAL PROTOCOLS;

EID: 70349118926     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368352     Document Type: Conference Paper
Times cited : (120)

References (15)
  • 2
    • 33745621564 scopus 로고    scopus 로고
    • Reducing time complexity in RFID systems
    • B. Preneel and S. Tavares, editors, of Lecture Notes in Computer Science, Kingston, Canada, August, Springer-Verlag
    • G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In B. Preneel and S. Tavares, editors, Selected Areas in Cryptography - SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 291-306, Kingston, Canada, August 2005. Springer-Verlag.
    • (2005) Selected Areas in Cryptography - SAC 2005 , vol.3897 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 5
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • M. Joye and J.-J. Quisquater, editors, of Lecture Notes in Computer Science, Boston, Massachusetts, USA, August, IACR, Springer-Verlag
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In M. Joye and J.-J. Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 357-370, Boston, Massachusetts, USA, August 2004. IACR, Springer-Verlag.
    • (2004) Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004 , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 7
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • P. Ning, S. Qing, and N. Li, editors, of Lecture Notes in Computer Science, Raleigh, North Carolina, USA, December, Springer-Verlag
    • C. H. Lim and T. Kwon. Strong and robust RFID authentication enabling perfect ownership transfer. In P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security - ICICS 2006, volume 4307 of Lecture Notes in Computer Science, pages 1-20, Raleigh, North Carolina, USA, December 2006. Springer-Verlag.
    • (2006) Conference on Information and Communications Security - ICICS 2006 , vol.4307 , pp. 1-20
    • Lim, C.H.1    Kwon, T.2
  • 8
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • B. Pfitzmann and P. Liu, editors, Washington, DC, USA, October, ACM, ACM Press
    • D. Molnar and D. Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In B. Pfitzmann and P. Liu, editors, Conference on Computer and Communications Security - ACM CCS 2004, pages 210-219, Washington, DC, USA, October 2004. ACM, ACM Press.
    • (2004) Conference on Computer and Communications Security - ACM CCS 2004 , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 9
    • 25444432606 scopus 로고    scopus 로고
    • RFID privacy issues and technical challenges
    • M. Ohkubo and K. Suzuki. RFID privacy issues and technical challenges. Communications of the ACM, 48 (9):66-71, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.9 , pp. 66-71
    • Ohkubo, M.1    Suzuki, K.2
  • 10
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to "privacy-friendly" tags
    • MIT, MA, USA, November
    • M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to "privacy-friendly" tags. In RFID Privacy Workshop 2003, MIT, MA, USA, November 2003.
    • (2003) RFID Privacy Workshop 2003
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 12
    • 38149050502 scopus 로고    scopus 로고
    • A family of dunces: Trivial RFID identification and authentication protocols
    • N. Borisov and P. Golle, editors, of Lecture Notes in Computer Science, Ottawa, Canada, Springer-Verlag
    • G. Tsudik. A family of dunces: Trivial RFID identification and authentication protocols. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies - PET 2007, volume 4776 of Lecture Notes in Computer Science, pages 45-61, Ottawa, Canada, 2007. Springer-Verlag.
    • (2007) Privacy Enhancing Technologies - PET 2007 , vol.4776 , pp. 45-61
    • Tsudik, G.1
  • 14
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • T. Okamoto, editor, of Lecture Notes in Computer Science, Kuching, Malaysia, December, Springer-Verlag
    • S. Vaudenay. On privacy models for RFID. In T. Okamoto, editor, Advances in Cryptology - Asiacrypt 2007, volume 4833 of Lecture Notes in Computer Science, pages 68-87, Kuching, Malaysia, December 2007. Springer-Verlag.
    • (2007) Advances in Cryptology - Asiacrypt 2007 , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 15
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • D. Hutter, G. Müller, W. Stephan, and M. Ullmann, editors, of Lecture Notes in Computer Science, Boppard, Germany, March, Springer-Verlag
    • S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In D. Hutter, G. Müller, W. Stephan, and M. Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of Lecture Notes in Computer Science, pages 454-469, Boppard, Germany, March 2003. Springer-Verlag.
    • (2003) International Conference on Security in Pervasive Computing - SPC 2003 , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.