메뉴 건너뛰기




Volumn 51, Issue 1, 2009, Pages 165-178

Protecting your privacy with a mobile agent device in RFID environment

Author keywords

Agent; Forgery detection; Privacy protection; Protocol; RFID

Indexed keywords

AUTOMATIC IDENTIFICATION; CONTACT LESS; CONTROL COMMUNICATIONS; CRYPTOGRAPHIC MODULE; FORGERY DETECTION; LIGHT WEIGHT; PRIVACY PROBLEMS; PRIVACY PROTECTION; PROBLEM OF PRIVACY; PROTOCOL; PROXY AGENTS; RADIO FREQUENCIES; RADIO FREQUENCY IDENTIFICATION TECHNOLOGY; RF-ID TAGS; RFID; RFID TECHNOLOGY; USER PRIVACY;

EID: 70349582554     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-008-9597-8     Document Type: Article
Times cited : (4)

References (22)
  • 1
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • B. Christianson, B. Crispo, T. M. A. Lomas, & M. Roe (Eds.) Paris, France: Springer-Verlag
    • Anderson, R. J., & Kuhn, M. G. (1997) Low cost attacks on tamper resistant devices. In B. Christianson, B. Crispo, T. M. A. Lomas, & M. Roe (Eds.), Security Protocols, 5th International Workshop, Lecture Notes in Computer Science (Vol. 1361, pp. 125-136). Paris, France: Springer-Verlag.
    • (1997) Security Protocols, 5th International Workshop, Lecture Notes in Computer Science , vol.1361 , pp. 125-136
    • Anderson, R.J.1    Kuhn, M.G.2
  • 2
    • 26444478592 scopus 로고    scopus 로고
    • RFID traceability: A multilayer problem
    • A. Patrick & M. Yung (Eds.) Roseau, The Commonwealth Of Dominica, IFCA, Springer-Verlag
    • Avoine, G., & Oechslin, P. (2005). RFID traceability: A multilayer problem. In A. Patrick & M. Yung (Eds.), Financial cryptography - FC'05, Lecture Notes in Computer Science (Vol. 3570, pp. 125-140). Roseau, The Commonwealth Of Dominica, IFCA, Springer-Verlag.
    • (2005) Financial Cryptography - FC'05, Lecture Notes in Computer Science , vol.3570 , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 8
    • 30344451754 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Juels, A. (2005). RFID security and privacy: A research survey. Manuscript.
    • (2005) Manuscript
    • Juels, A.1
  • 10
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • V. Shoup (Ed.) Santa Barbara, CA, USA: IACR, Springer-Verlag
    • Juels, A., & Weis, S. (2005). Authenticating pervasive devices with human protocols. In: V. Shoup (Ed.), Advances in Cryptology - CRYPTO'05, Lecture Notes in Computer Science (Vol. 3126, pp. 293-308). Santa Barbara, CA, USA: IACR, Springer-Verlag.
    • (2005) Advances in Cryptology - CRYPTO'05, Lecture Notes in Computer Science , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 14
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to "privacy-friendly" tags
    • MIT, MA, USA
    • Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to "privacy-friendly" tags. In RFID Privacy Workshop. MIT, MA, USA.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 18
    • 2942556410 scopus 로고    scopus 로고
    • Radio-frequency identification: Security risks and challenges
    • S. Sarma S. Weis D. Engels 2003 Radio-frequency identification: security risks and challenges Cryptobytes, RSA Laboratories 6 1 2 9
    • (2003) Cryptobytes, RSA Laboratories , vol.6 , Issue.1 , pp. 2-9
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 19
    • 33144480778 scopus 로고    scopus 로고
    • Security parallels between people and pervasive devices
    • IEEE, IEEE Computer Society Press, Kauai Island, Hawaii, USA
    • Weis, S. (2005). Security parallels between people and pervasive devices. In International Workshop on Pervasive Computing and Communication Security - PerSec 2005 (pp. 105-109). IEEE, IEEE Computer Society Press, Kauai Island, Hawaii, USA.
    • (2005) International Workshop on Pervasive Computing and Communication Security - PerSec 2005 , pp. 105-109
    • Weis, S.1
  • 20
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Hutter, G. Müller, W. Stephan, M. Ullmann (Eds.) Boppard, Germany: Springer-Verlag
    • Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. In D. Hutter, G. Müller, W. Stephan, & M. Ullmann (Eds.), International Conference on Security in Pervasive Computing - SPC 2003, Lecture Notes in Computer Science (Vol. 2802, pp. 454-469). Boppard, Germany: Springer-Verlag.
    • (2003) International Conference on Security in Pervasive Computing - SPC 2003, Lecture Notes in Computer Science , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 22
    • 38149104634 scopus 로고    scopus 로고
    • Forward secure privacy protection scheme for rfid system using advanced encryption standard
    • P. Thulasiraman, X. He, T. L. Xu, M. K. Denko, R. K. Thulasiram, L. T. Yang (Eds.) Niagara Falls, Canada: Springer
    • Yeo, S. S., Sakurai, K., Cho, S., Yang, K., & Kim, S. K. (2007). Forward secure privacy protection scheme for rfid system using advanced encryption standard. In P. Thulasiraman, X. He, T. L. Xu, M. K. Denko, R. K. Thulasiram, & L. T. Yang (Eds.), ISPA Workshops, Lecture Notes in Computer Science (Vol. 4743, pp. 245-254). Niagara Falls, Canada: Springer.
    • (2007) ISPA Workshops, Lecture Notes in Computer Science , vol.4743 , pp. 245-254
    • Yeo, S.S.1    Sakurai, K.2    Cho, S.3    Yang, K.4    Kim, S.K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.