메뉴 건너뛰기




Volumn , Issue , 2009, Pages 251-254

Enhancement of the RFID security method with ownership transfer

Author keywords

Efficiency; Integrity; Ownership transfer; RFID system

Indexed keywords

DOS ATTACKS; FORWARD SECURITY; INDISTINGUISHABILITY; INTEGRITY; OWNERSHIP TRANSFER; PRIVACY AND SECURITY; REPLAY ATTACK; RESEARCH STUDIES; RFID APPLICATIONS; RFID SECURITY; RFID SYSTEM; SECURITY REQUIREMENTS;

EID: 70349120905     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1516241.1516284     Document Type: Conference Paper
Times cited : (31)

References (12)
  • 1
    • 33745621564 scopus 로고    scopus 로고
    • Reducing time complexity in RFID systems
    • Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography, Canada Kingston, Canada
    • G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography, Canada Kingston, Canada, LNCS 3897, pp. 291-306, 2005.
    • (2005) LNCS , vol.3897 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 2
    • 33745926180 scopus 로고    scopus 로고
    • New security problem in RFID systems tag killing
    • Proceedings of International Conference on Applied Cryptography and Information Security, Glasgow, UK
    • D.G. Han, T. Takagi, H.W. Kim, and K.I. Chung. New security problem in RFID systems tag killing. In Proceedings of International Conference on Applied Cryptography and Information Security, Glasgow, UK, LNCS 3982, pp. 375-384, 2006.
    • (2006) LNCS , vol.3982 , pp. 375-384
    • Han, D.G.1    Takagi, T.2    Kim, H.W.3    Chung, K.I.4
  • 7
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • Apr
    • S. Piramuthu. Protocols for RFID tag/reader authentication. Decision Support Systems, vol. 43, no. 3, pp. 897-914, Apr. 2007.
    • (2007) Decision Support Systems , vol.43 , Issue.3 , pp. 897-914
    • Piramuthu, S.1
  • 8
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Proceedings of the 2nd International Conference on Security in Pervasive Computing, Boppard, Germany
    • K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-response based RFID authentication protocol for distributed database environment. In Proceedings of the 2nd International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 3450, pp. 70-84, 2005.
    • (2005) LNCS , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 9
    • 38949212887 scopus 로고    scopus 로고
    • Owner transferable privacy protection scheme for RFID tags
    • J. Saito and K. Sakurai. Owner transferable privacy protection scheme for RFID tags. Joho Shori Gakkai Shinpojiumu Ronbunshu, vol. 2005, no. 13, pp. 283-288, 2005.
    • (2005) Joho Shori Gakkai Shinpojiumu Ronbunshu , vol.2005 , Issue.13 , pp. 283-288
    • Saito, J.1    Sakurai, K.2
  • 10
    • 0003855464 scopus 로고    scopus 로고
    • 2nd Edition. John Wiley and Sons, New York
    • B. Schneier. Applied Cryptography. 2nd Edition. John Wiley and Sons, New York, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 11
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany
    • S.A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 2802, pp. 201-212, 2003.
    • (2003) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.2    Rivest, R.3    Engels, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.