메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Randomizing RFID private authentication

Author keywords

Private authentication; Random walk; RFID

Indexed keywords

ANALYSIS RESULTS; DESYNCHRONIZATION; FORWARD SECRECY; FORWARD SECURITY; HIGH-SPEED; KEY COMPONENT; PRIVACY PROTECTION; PRIVATE AUTHENTICATION; RADIO FREQUENCY IDENTIFICATION SYSTEMS; RANDOM WALK; RFID; RFID SYSTEMS; SECURITY PROTECTION; TREE-BASED APPROACH;

EID: 70349337026     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOM.2009.4912773     Document Type: Conference Paper
Times cited : (41)

References (29)
  • 3
    • 34547617684 scopus 로고    scopus 로고
    • Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
    • P. Robinson and M. Beigl, "Trust Context Spaces: an Infrastructure for Pervasive Security in Context-Aware Environments", in Proceedings of SPC, 2003.
    • (2003) Proceedings of SPC
    • Robinson, P.1    Beigl, M.2
  • 5
    • 36349008689 scopus 로고    scopus 로고
    • Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks
    • December
    • W. Gu, X. Bai, S. Chellappan, D. Xuan and W. Jia, "Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 12, December 2007, pp. 1784-1796.
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.12 , pp. 1784-1796
    • Gu, W.1    Bai, X.2    Chellappan, S.3    Xuan, D.4    Jia, W.5
  • 6
    • 34548310312 scopus 로고    scopus 로고
    • Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks
    • Q. Cao, T. Abdelzaher, T. He, and R. Kravets, "Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks", in Proceedings of INFOCOM, 2007.
    • (2007) Proceedings of INFOCOM
    • Cao, Q.1    Abdelzaher, T.2    He, T.3    Kravets, R.4
  • 7
    • 51349154747 scopus 로고    scopus 로고
    • An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks
    • Z. Jiang, J. Ma, W. Lou, and J. Wu, "An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks", in Proceedings of INFOCOM, 2008.
    • (2008) Proceedings of INFOCOM
    • Jiang, Z.1    Ma, J.2    Lou, W.3    Wu, J.4
  • 8
    • 33750353849 scopus 로고    scopus 로고
    • A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete
    • T. Dimitriou, "A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete", in Proceedings of IEEE PerCom, 2006.
    • (2006) Proceedings of IEEE PerCom
    • Dimitriou, T.1
  • 9
    • 34547617482 scopus 로고    scopus 로고
    • Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
    • L. Lu, J. Han, L. Hu, Y. Liu, and L. M. Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems", in Proceedings of IEEE PerCom, 2007.
    • (2007) Proceedings of IEEE PerCom
    • Lu, L.1    Han, J.2    Hu, L.3    Liu, Y.4    Ni, L.M.5
  • 11
    • 38149058455 scopus 로고    scopus 로고
    • LASEC Security and Cryptography Laboratory, available online at, 2007
    • G. Avoine, "Bibliography on Security and Privacy in RFID Systems", LASEC Security and Cryptography Laboratory, available online at http://lasecwww.epfl.ch/̃gavoine/rfid, 2007.
    • Bibliography on Security and Privacy in RFID Systems
    • Avoine, G.1
  • 13
    • 33749408130 scopus 로고    scopus 로고
    • Cryptography in Radio Frequency Identification and Fair Exchange Protocols
    • Ph.D. thesis, EPFL, Lausanne, Switzerland
    • G. Avoine, "Cryptography in Radio Frequency Identification and Fair Exchange Protocols", Ph.D. thesis, EPFL, Lausanne, Switzerland, 2005.
    • (2005)
    • Avoine, G.1
  • 14
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and Privacy: A Research Survey
    • A. Juels, "RFID Security and Privacy: a Research Survey", Selected Areas in Communication, IEEE Journal on, Vol. 24, No. 2, 2006, pp. 381-394.
    • (2006) Selected Areas in Communication, IEEE Journal on , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 15
    • 70349368349 scopus 로고    scopus 로고
    • RFID in Pervasive Computing: State-of-the-art and Outlook
    • Elsevier
    • G. Roussos and V. Kostakos, "RFID in Pervasive Computing: State-of-the-art and Outlook", Pervasive and Mobile Computing, Elsevier, 2008.
    • (2008) Pervasive and Mobile Computing
    • Roussos, G.1    Kostakos, V.2
  • 16
    • 21144438831 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • S. Weis, S. Sarma, R. Rivest and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", in Proceedings of SPC, 2003.
    • (2003) Proceedings of SPC
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 19
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers
    • D. Henrici and P. Müller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers", in Proceedings of Pervasive Computing and Communications Workshops, 2004.
    • (2004) Proceedings of Pervasive Computing and Communications Workshops
    • Henrici, D.1    Müller, P.2
  • 20
    • 20844453821 scopus 로고    scopus 로고
    • Minimalist Cryptography for Low-Cost RFID Tags
    • A. Juels, "Minimalist Cryptography for Low-Cost RFID Tags", in Proceedings of SCN, 2004.
    • (2004) Proceedings of SCN
    • Juels, A.1
  • 21
    • 34547626956 scopus 로고    scopus 로고
    • A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks
    • T. Dimitriou, "A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks", in Proceedings of SecureComm, 2005.
    • (2005) Proceedings of SecureComm
    • Dimitriou, T.1
  • 22
    • 49149085742 scopus 로고    scopus 로고
    • Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
    • D Henrici, P Müller, "Providing Security and Privacy in RFID Systems Using Triggered Hash Chains", in Proceedings of IEEE PerCom, 2008.
    • (2008) Proceedings of IEEE PerCom
    • Henrici, D.1    Müller, P.2
  • 23
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and Security in Library RFID: Issues, Practices, and Architectures
    • D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures", in Proceedings of ACM CCS, 2004.
    • (2004) Proceedings of ACM CCS
    • Molnar, D.1    Wagner, D.2
  • 25
    • 49149091904 scopus 로고    scopus 로고
    • Randomized Bit Encoding for Stronger Backward Channel Protection
    • T. L. Lim, T. Li, and S. L. Yeo , "Randomized Bit Encoding for Stronger Backward Channel Protection", in Proceedings of IEEE PerCom, 2008.
    • (2008) Proceedings of IEEE PerCom
    • Lim, T.L.1    Li, T.2    Yeo, S.L.3
  • 26
    • 34548180384 scopus 로고    scopus 로고
    • A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags
    • D. Molnar, A. Soppera, and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags", in Proceedings of SAC, 2005.
    • (2005) Proceedings of SAC
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 27
    • 34547635774 scopus 로고    scopus 로고
    • Serverless Search and Authentication Protocols for RFID
    • C. Tan, B. Sheng, and Q. Li, "Serverless Search and Authentication Protocols for RFID", in Proceedings of IEEE PerCom, 2007.
    • (2007) Proceedings of IEEE PerCom
    • Tan, C.1    Sheng, B.2    Li, Q.3
  • 29
    • 51349086896 scopus 로고    scopus 로고
    • Towards Statistically Strong Source Anonymity for Sensor Networks
    • M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks", in Proceedings of INFOCOM, 2008.
    • (2008) Proceedings of INFOCOM
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.