메뉴 건너뛰기




Volumn , Issue , 2009, Pages 40-48

Lightweight secure search protocols for low-cost RFID systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION CAPACITY; HARDWARE RESOURCES; LINEAR FEEDBACK SHIFT REGISTERS; MALICIOUS ATTACK; PROCESSING TIME; RESOURCE CONSTRAINT; RFID READERS; RFID SYSTEMS; RFID TECHNOLOGY; SEARCH PROTOCOLS; SECURITY MECHANISM; SECURITY PROBLEMS;

EID: 70350247896     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2009.12     Document Type: Conference Paper
Times cited : (22)

References (13)
  • 2
    • 51849144293 scopus 로고    scopus 로고
    • Extended Abstract: The Butterfly PUF Protecting IP on every FPGA
    • June
    • S. Kumar, J Guajardo et al., "Extended Abstract: The Butterfly PUF Protecting IP on every FPGA" , in Hardware-Oriented Security and Trust (HOST) , pp.67-70, June 2008.
    • (2008) Hardware-Oriented Security and Trust (HOST) , pp. 67-70
    • Kumar, S.1    Guajardo, J.2
  • 3
  • 4
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • A. Juels, S. A. Weis, "Authenticating Pervasive Devices with Human Protocols" , in Advances in Cryptology (CRYPTO), pp. 293-308, 2005.
    • (2005) Advances in Cryptology (CRYPTO) , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 6
    • 70350220394 scopus 로고    scopus 로고
    • Statistical Analysis of Silicon PUF responses for Device Identification
    • R. Maes, P. Tuyls, and I. Verbauwhede, "Statistical Analysis of Silicon PUF responses for Device Identification" , in SECSI Workshop, 2008.
    • (2008) SECSI Workshop
    • Maes, R.1    Tuyls, P.2    Verbauwhede, I.3
  • 7
    • 34547635774 scopus 로고    scopus 로고
    • Serverless Search and Authentication Protocols for RFID
    • Chiu C. Tan, Bo Sheng, and Qun Li, "Serverless Search and Authentication Protocols for RFID" , in IEEE Percom, pages 3-12, 2007.
    • (2007) IEEE Percom , pp. 3-12
    • Tan, C.C.1    Sheng, B.2    Li, Q.3
  • 9
    • 34547307341 scopus 로고    scopus 로고
    • Physical Unclonable Functions for Device Authentication and Secret Key Generation
    • G. E. Suh, S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation" , in Design Automation Conference - DAC 2007, 2007.
    • (2007) Design Automation Conference - DAC 2007
    • Suh, G.E.1    Devadas, S.2
  • 10
    • 51049092732 scopus 로고    scopus 로고
    • Hash Functions and RFID Tags : Mind The Gap
    • Proceedings of the 10th International Workshop Cryptographic Hardware and Embedded Systems CHES 2008
    • Bogdanov, Andrey and Leander, Gregor and Paar, Christof and Poschmann, Axel and Robshaw, Matt J.B. and Seurin, Yannick, "Hash Functions and RFID Tags : Mind The Gap", in Proceedings of the 10th International Workshop Cryptographic Hardware and Embedded Systems (CHES 2008), LNCS, vol. 5154, 2008.
    • (2008) LNCS , vol.5154
    • Bogdanov, A.1    Leander, G.2    Paar, C.3    Poschmann, A.4    Robshaw, M.J.B.5    Seurin, Y.6
  • 12
    • 79957568621 scopus 로고    scopus 로고
    • technical Reports, University of Otago, New Zealand
    • R. Ward, T. Molteno, "Table of Linear Feedback Shift Registers", http://www.physics.otago.ac.nz/px/research/electronics/ papers/technical-reports/lfsr-table.pdf, technical Reports, University of Otago, New Zealand.
    • Table of Linear Feedback Shift Registers
    • Ward, R.1    Molteno, T.2
  • 13
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C. Shannon, "Communication Theory of Secrecy Systems", in Bell System Technical Journal, vol. 28(4), pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.