메뉴 건너뛰기




Volumn 5789 LNCS, Issue , 2009, Pages 321-336

New privacy results on synchronized RFID authentication protocols against tag tracing

Author keywords

[No Author keywords available]

Indexed keywords

ASYMMETRIC CRYPTOGRAPHY; CANDIDATE PROTOCOL; COMPUTATIONAL POWER; OFFLINE; PRIVACY MODELS; PRIVACY PROTECTION; RESYNCHRONIZATION; RFID AUTHENTICATION; TRACING ATTACKS;

EID: 70350383766     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04444-1_20     Document Type: Conference Paper
Times cited : (28)

References (37)
  • 1
    • 70350424348 scopus 로고    scopus 로고
    • Avoine, G.: Privacy Issues in RFID Banknote Protection Schemes. In: CARDIS, pp. 34-38. Kluwer Academic Publishers, Dordrecht (2004)
    • Avoine, G.: Privacy Issues in RFID Banknote Protection Schemes. In: CARDIS, pp. 34-38. Kluwer Academic Publishers, Dordrecht (2004)
  • 3
    • 26444443915 scopus 로고    scopus 로고
    • A Scalable and Provably Secure Hash-Based RFID Protocol. In: PerSec
    • Los Alamitos
    • Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: PerSec, pp. 110-114. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) IEEE Computer Society Press , pp. 110-114
    • Avoine, G.1    Oechslin, P.2
  • 4
    • 26444478592 scopus 로고    scopus 로고
    • Avoine,G.,Oechslin,P.:RFIDTraceability: AMultilayer Problem. In: S.Patrick,A., Yung,M. (eds.) FC 2005. LNCS, 3570, pp. 125-140. Springer, Heidelberg (2005)
    • Avoine,G.,Oechslin,P.:RFIDTraceability: AMultilayer Problem. In: S.Patrick,A., Yung,M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
  • 5
    • 38149091047 scopus 로고    scopus 로고
    • Chien, H.-Y., Huang, C.-W.: A Lightweight RFID Protocol Using Substring. In: EUC, pp. 422-431 (2007)
    • Chien, H.-Y., Huang, C.-W.: A Lightweight RFID Protocol Using Substring. In: EUC, pp. 422-431 (2007)
  • 6
    • 33847330246 scopus 로고    scopus 로고
    • A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks
    • Dimitriou, T.: A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks. In: SecureComm (2005)
    • (2005) SecureComm
    • Dimitriou, T.1
  • 7
    • 35048899238 scopus 로고    scopus 로고
    • Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 163-178. Springer, Heidelberg (2004)
    • Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163-178. Springer, Heidelberg (2004)
  • 8
    • 38149047468 scopus 로고    scopus 로고
    • Low-cost and Strong-security RFID Authentication Protocol
    • Ha, J., Moon, S.-J., Nieto, J.M.G., Boyd, C.: Low-cost and Strong-security RFID Authentication Protocol. In: EUC Workshops, pp. 795-807 (2007)
    • (2007) EUC Workshops , pp. 795-807
    • Ha, J.1    Moon, S.-J.2    Nieto, J.M.G.3    Boyd, C.4
  • 9
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec
    • Los Alamitos
    • Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec, pp. 149-153. IEEE Computer Society Press, Los Alamitos (2004)
    • (2004) IEEE Computer Society Press , pp. 149-153
    • Henrici, D.1    Muller, P.2
  • 12
    • 33745757995 scopus 로고    scopus 로고
    • Kang, J., Nyang, D.: RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, 3813, pp. 164-175. Springer, Heidelberg (2005)
    • Kang, J., Nyang, D.: RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 164-175. Springer, Heidelberg (2005)
  • 13
    • 70350414388 scopus 로고    scopus 로고
    • Kim, I.J., Choi, E.Y., Lee, D.H.: Secure Mobile RFID System Against Privacy and Security Problems. In: SecPerU (2007)
    • Kim, I.J., Choi, E.Y., Lee, D.H.: Secure Mobile RFID System Against Privacy and Security Problems. In: SecPerU (2007)
  • 14
    • 33845415153 scopus 로고    scopus 로고
    • Kim, K.H., Choi, E.Y., Lee, S.-M., Lee, D.H.: Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, 4277, pp. 362-371. Springer, Heidelberg (2006)
    • Kim, K.H., Choi, E.Y., Lee, S.-M., Lee, D.H.: Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 362-371. Springer, Heidelberg (2006)
  • 17
    • 24944582157 scopus 로고    scopus 로고
    • Efficient authentication for lowcost RFID systems
    • Gervasi, O, Gavrilova, M.L, Kumar, V, Laganá, A, Lee, H.P, Mun, Y, Taniar, D, Tan, C.J.K, eds, ICCSA 2005, Springer, Heidelberg
    • Lee, S.M., Hwang, Y.J., Lee, D.-H., Lim, J.-I.: Efficient authentication for lowcost RFID systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619-627. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3480 , pp. 619-627
    • Lee, S.M.1    Hwang, Y.J.2    Lee, D.-H.3    Lim, J.-I.4
  • 18
    • 34748921704 scopus 로고    scopus 로고
    • Li, Y., Ding, X.: Protecting RFID Communications in Supply Chains. In: ASIACCS, pp. 234-241. ACM Press, New York (2007)
    • Li, Y., Ding, X.: Protecting RFID Communications in Supply Chains. In: ASIACCS, pp. 234-241. ACM Press, New York (2007)
  • 19
    • 38149000154 scopus 로고    scopus 로고
    • An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System
    • Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: TRUST - EUC Workshops, pp. 43-56 (2007)
    • (2007) TRUST - EUC Workshops , pp. 43-56
    • Lo, N.W.1    Yeh, K.-H.2
  • 20
    • 70350424346 scopus 로고    scopus 로고
    • Lo, N.W., Yeh, K.-H.: Hash-based Mutual Authentication Protocol for Mobile RFID Systems with Robust Reader-side Privacy Protection. In: SenseID - ACM SenSys Workshops (2007)
    • Lo, N.W., Yeh, K.-H.: Hash-based Mutual Authentication Protocol for Mobile RFID Systems with Robust Reader-side Privacy Protection. In: SenseID - ACM SenSys Workshops (2007)
  • 21
    • 38049077489 scopus 로고    scopus 로고
    • Novel RFID Authentication Schemes for Security Enhancement and System Efficiency
    • Lo, N.W., Yeh, K.-H.: Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. In: VLDB - Secure Data Management Workshops, pp. 203-212 (2007)
    • (2007) VLDB - Secure Data Management Workshops , pp. 203-212
    • Lo, N.W.1    Yeh, K.-H.2
  • 22
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and Security in Library RFID: Issues, Practices, and Architectures
    • Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: ACM CCS, pp. 210-219 (2004)
    • (2004) ACM CCS , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 23
    • 57049184162 scopus 로고    scopus 로고
    • RFID Privacy Models Revisited
    • Jajodia, S, Lopez, J, eds, ESORICS 2008, Springer, Heidelberg
    • Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID Privacy Models Revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-266. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 251-266
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 26
    • 70350414387 scopus 로고    scopus 로고
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: SCIS (2004)
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: SCIS (2004)
  • 28
    • 38349066494 scopus 로고    scopus 로고
    • Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), 4456, pp. 778-787. Springer, Heidelberg (2007)
    • Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 778-787. Springer, Heidelberg (2007)
  • 29
    • 70349118926 scopus 로고    scopus 로고
    • Paise, R.-l., Vaudenay, S.: Mutual Authentication in RFID. In: ASIACCS, pp. 292-299. ACM Press, New York (2008)
    • Paise, R.-l., Vaudenay, S.: Mutual Authentication in RFID. In: ASIACCS, pp. 292-299. ACM Press, New York (2008)
  • 30
    • 33750291916 scopus 로고    scopus 로고
    • Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, 4217, pp. 159-170. Springer, Heidelberg (2006)
    • Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159-170. Springer, Heidelberg (2006)
  • 31
    • 38049010942 scopus 로고    scopus 로고
    • Information Confinement, Privacy, and Security in RFID Systems
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Di Pietro, R., Molva, R.: Information Confinement, Privacy, and Security in RFID Systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 187-202. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 187-202
    • Di Pietro, R.1    Molva, R.2
  • 32
    • 33749406338 scopus 로고    scopus 로고
    • A Scalable and Untraceable Authentication Protocol for RFID
    • Seo, Y., Lee, H., Kim, K.: A Scalable and Untraceable Authentication Protocol for RFID. In: EUC Workshops, pp. 252-261 (2006)
    • (2006) EUC Workshops , pp. 252-261
    • Seo, Y.1    Lee, H.2    Kim, K.3
  • 33
    • 38149050502 scopus 로고    scopus 로고
    • Tsudik, G.: A Family of Dunces: Trivial RFID Identification and Authentication Protocols. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 45-61. Springer, Heidelberg (2007)
    • Tsudik, G.: A Family of Dunces: Trivial RFID Identification and Authentication Protocols. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 45-61. Springer, Heidelberg (2007)
  • 35
    • 38149038702 scopus 로고    scopus 로고
    • On Privacy Models for RFID
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 36
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.