메뉴 건너뛰기




Volumn 110, Issue 2, 2009, Pages 57-61

On a new formal proof model for RFID location privacy

Author keywords

Cryptography; Formal proof models; Location privacy; RFID protocols; Untraceability

Indexed keywords

CLEAR TEXT; FORMAL PROOF MODEL; LOCATION PRIVACY; RFID PROTOCOLS; UNTRACEABILITY;

EID: 70449622575     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ipl.2009.10.007     Document Type: Article
Times cited : (11)

References (14)
  • 1
    • 33744939250 scopus 로고    scopus 로고
    • Adversary model for radio frequency identification
    • Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL, Security and Cryptography Laboratory LASEC, Lausanne, Switzerland, September
    • G. Avoine, Adversary model for radio frequency identification, Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, September 2005
    • (2005)
    • Avoine, G.1
  • 2
    • 44649113207 scopus 로고    scopus 로고
    • Untraceability of RFID protocols
    • Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. Seville, Spain, Springer
    • van Deursen T., Mauw S., and Radomirović S. Untraceability of RFID protocols. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. Seville, Spain. Lecture Notes in Computer Science vol. 5019 (2008), Springer 1-15
    • (2008) Lecture Notes in Computer Science , vol.5019 , pp. 1-15
    • van Deursen, T.1    Mauw, S.2    Radomirović, S.3
  • 3
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Advances in Cryptology - ASIACRYPT 2007. Kuching, Malaysia, Springer-Verlag
    • Vaudenay S. On privacy models for RFID. Advances in Cryptology - ASIACRYPT 2007. Kuching, Malaysia. Lecture Notes in Computer Science vol. 4833 (2007), Springer-Verlag 68-87
    • (2007) Lecture Notes in Computer Science , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 5
    • 57049137188 scopus 로고    scopus 로고
    • J. Ha, S. Moon, J. Zhou, J. Ha, A new formal proof model for RFID location privacy, in: ESORICS, 2008, pp. 267-281
    • J. Ha, S. Moon, J. Zhou, J. Ha, A new formal proof model for RFID location privacy, in: ESORICS, 2008, pp. 267-281
  • 7
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev D., and Yao A. On the security of public key protocols. IEEE Trans. Inform. Theory IT-29 2 (1983) 198-208
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 8
    • 70350337337 scopus 로고    scopus 로고
    • How to hash into elliptic curves
    • CRYPTO 2009, Springer
    • Icart T. How to hash into elliptic curves. CRYPTO 2009. Lecture Notes in Computer Science (2009), Springer 303-316
    • (2009) Lecture Notes in Computer Science , pp. 303-316
    • Icart, T.1
  • 10
    • 70349268101 scopus 로고    scopus 로고
    • Untraceable RFID authentication protocols: Revision of EC-RAC
    • Orlando, Florida, USA
    • Y. Lee, L. Batina, I. Verbauwhede, Untraceable RFID authentication protocols: Revision of EC-RAC, in: IEEE International Conference on RFID, RFID 2009, Orlando, Florida, USA, 2009, pp. 178-185
    • (2009) IEEE International Conference on RFID, RFID , pp. 178-185
    • Lee, Y.1    Batina, L.2    Verbauwhede, I.3
  • 14
    • 35048902569 scopus 로고    scopus 로고
    • B. Möller, A public-key encryption scheme with pseudo-random ciphertexts, in: ESORICS, 2004, pp. 335-351
    • B. Möller, A public-key encryption scheme with pseudo-random ciphertexts, in: ESORICS, 2004, pp. 335-351


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.