메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1953-1961

ACTION: Breaking the privacy barrier for RFID systems

Author keywords

Authentication; Compromising; Privacy; RFID

Indexed keywords

AUTHENTICATION PROTOCOLS; COMPROMISING; ENCRYPTED MESSAGES; KEY MANAGEMENT; KEY STORAGE; LARGE-SCALE DEPLOYMENT; PRIVACY; PRIVACY-PRESERVING AUTHENTICATION; PRIVATE INFORMATION; RADIO FREQUENCY IDENTIFICATION SYSTEMS; RFID; RFID SYSTEMS; SEARCH EFFICIENCY; SEARCH SCHEME; SEARCH SPEED; SHORT RESPONSE TIME; SPARSE-TREE ARCHITECTURE; TREE-BASED;

EID: 70349666896     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062117     Document Type: Conference Paper
Times cited : (54)

References (23)
  • 3
    • 34748921704 scopus 로고    scopus 로고
    • Protecting RFID Communications in Supply Chains
    • Y. Li and X. Ding, "Protecting RFID Communications in Supply Chains," in Proceedings of ASIACCS, 2007.
    • (2007) Proceedings of ASIACCS
    • Li, Y.1    Ding, X.2
  • 4
    • 34547617684 scopus 로고    scopus 로고
    • Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
    • P. Robinson and M. Beigl, "Trust Context Spaces: an Infrastructure for Pervasive Security in Context-Aware Environments," in Proceedings of SPC, 2003.
    • (2003) Proceedings of SPC
    • Robinson, P.1    Beigl, M.2
  • 5
    • 21144438831 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," in Proceedings of SPC, 2003.
    • (2003) Proceedings of SPC
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 6
    • 70349700627 scopus 로고    scopus 로고
    • A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete
    • T. Dimitriou, "A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete," in Proceedings of PerCom, 2006.
    • (2006) Proceedings of PerCom
    • Dimitriou, T.1
  • 7
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and Security in Library RFID: Issues, Practices, and Architectures
    • D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," in Proceedings of CCS, 2004.
    • (2004) Proceedings of CCS
    • Molnar, D.1    Wagner, D.2
  • 8
    • 34548180384 scopus 로고    scopus 로고
    • A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags
    • D. Molnar, A. Soppera, and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags," in Proceedings of SAC, 2005.
    • (2005) Proceedings of SAC
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 9
    • 34547617482 scopus 로고    scopus 로고
    • Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
    • L. Lu, J. Han, L. Hu, Y. Liu, and L. M. Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems," in Proceedings of PerCom, 2007.
    • (2007) Proceedings of PerCom
    • Lu, L.1    Han, J.2    Hu, L.3    Liu, Y.4    Ni, L.M.5
  • 14
    • 20844453821 scopus 로고    scopus 로고
    • Minimalist Cryptography for Low-Cost RFID Tags
    • A. Juels, "Minimalist Cryptography for Low-Cost RFID Tags," in Proceedings of SCN, 2004.
    • (2004) Proceedings of SCN
    • Juels, A.1
  • 15
    • 34547626956 scopus 로고    scopus 로고
    • A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks
    • T. Dimitriou, "A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks," in Proceedings of SecureComm, 2005.
    • (2005) Proceedings of SecureComm
    • Dimitriou, T.1
  • 16
    • 33750290259 scopus 로고    scopus 로고
    • YA-TRAP: Yet Another Trivial RFID Authentication Protocol
    • G. Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol," in Proceedings of PerCom Workshops, 2006.
    • (2006) Proceedings of PerCom Workshops
    • Tsudik, G.1
  • 19
    • 70349712952 scopus 로고    scopus 로고
    • G. Avoine, Adversarial Model for Radio Frequency Identification, Technical Report 2005/049. http://eprint.iacr.org/2005/ 049, 2005.
    • G. Avoine, "Adversarial Model for Radio Frequency Identification," Technical Report 2005/049. http://eprint.iacr.org/2005/ 049, 2005.
  • 20
    • 51349086896 scopus 로고    scopus 로고
    • Towards Statistically Strong Source Anonymity for Sensor Networks
    • M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks," in Proceedings of Infocom, 2008.
    • (2008) Proceedings of Infocom
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 21
    • 51849160751 scopus 로고    scopus 로고
    • On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs
    • W. Gu, Z. Yang, C. Que, D. Xuan and W. Jia, "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs," in Proceedings of ICDCS, 2008.
    • (2008) Proceedings of ICDCS
    • Gu, W.1    Yang, Z.2    Que, C.3    Xuan, D.4    Jia, W.5
  • 22
    • 41449110757 scopus 로고    scopus 로고
    • A New Fault-Information Model for Adaptive & Minimal Routing in 3-D Meshes
    • Z. Jiang, J. Wu, and D. Wang, "A New Fault-Information Model for Adaptive & Minimal Routing in 3-D Meshes," IEEE Transactions on Reliability, vol. 57, 2008.
    • (2008) IEEE Transactions on Reliability , vol.57
    • Jiang, Z.1    Wu, J.2    Wang, D.3
  • 23
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," in Proceedings of CCS, 1993.
    • (1993) Proceedings of CCS
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.