메뉴 건너뛰기




Volumn 3, Issue 3, 2008, Pages 1-10

Security analysis on a family of ultra-lightweight RFID authentication protocols

Author keywords

RFID authentication; Security and privacy; Ultra lightweight primitives

Indexed keywords

AUTHENTICATION; COMPUTER CRIME;

EID: 70450286845     PISSN: 1796217X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jsw.3.3.1-10     Document Type: Article
Times cited : (33)

References (21)
  • 2
    • 33845920117 scopus 로고    scopus 로고
    • ++: A Lightweight Authentication Protocol Secure against Some Attacks
    • IEEE Computer Society Press
    • ++: a Lightweight Authentication Protocol Secure against Some Attacks. In: Proc. of SecPerU'06, pp. 28-33. IEEE Computer Society Press, 2006.
    • (2006) Proc. of SecPerU'06 , pp. 28-33
    • Bringer, J.1    Chabanne, H.2    Dottax, E.3
  • 4
    • 78651575777 scopus 로고    scopus 로고
    • EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.0.9
    • EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.0.9.
  • 5
    • 34548183965 scopus 로고    scopus 로고
    • An Application of RFID Tags using Secure Symmetric Authentication
    • IEEE Computer Society Press
    • M. Feldhofer, M. Aigner, and S. Dominikus. An Application of RFID Tags using Secure Symmetric Authentication. In: Proc. of SecPerU'05, IEEE Computer Society Press, 2005.
    • (2005) Proc. of SecPerU'05
    • Feldhofer, M.1    Aigner, M.2    Dominikus, S.3
  • 8
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist Cryptography for Low-Cost RFID Tags
    • Proc. of SCN'04, Springer-Verlag
    • A. Juels. Minimalist Cryptography for Low-Cost RFID Tags. In: Proc. of SCN'04, LNCS 3352, pp. 149-164. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3352 , pp. 149-164
    • Juels, A.1
  • 9
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and Privacy: A Research Survey
    • Feb
    • A. Juels. RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications, 24(2): 381-394, Feb. 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 10
    • 35248832722 scopus 로고    scopus 로고
    • Squealing euros: Privacy protection in RFID-enabled banknotes
    • Proc. of FC'03, Springer-Verlag
    • A. Juels and R. Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In: Proc. of FC'03, LNCS 2742, pp. 103-121. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2742 , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 11
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Proc. of CRYPTO'05, Springer-Verlag
    • A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In: Proc. of CRYPTO'05, LNCS 3126, pp. 293-308. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 12
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and Security in Library RFID: Issues, Practices, and Architectures
    • ACM Press
    • D. Molnar and D. Wagner. Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: Proc. of CCS'04, pp. 210-219. ACM Press, 2004.
    • (2004) Proc. of CCS'04 , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 14
    • 33750067948 scopus 로고    scopus 로고
    • 2 AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags
    • Proc. of International Conference on Ubiquitous Intelligence and Computing UIC'06, Springer-Verlag
    • 2 AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Proc. of International Conference on Ubiquitous Intelligence and Computing UIC'06, LNCS 4159, pp. 912-923. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 17
    • 84958984270 scopus 로고    scopus 로고
    • Efficient Algorithms for Computing Differential Properties of Addition
    • Proc. of FSE '01, Springer-Verlag
    • H. Lipmaa and S. Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In: Proc. of FSE '01, LNCS 2355, pp. 336-350. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2355 , pp. 336-350
    • Lipmaa, H.1    Moriai, S.2
  • 18
    • 36248977046 scopus 로고    scopus 로고
    • Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
    • In the, 14-16 May, Sandton, Gauteng, South Africa
    • T. Li, G. Wang, "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols," In the proceeding of IFIP SEC 2007, 14-16 May 2007, Sandton, Gauteng, South Africa.
    • (2007) proceeding of IFIP SEC 2007
    • Li, T.1    Wang, G.2
  • 19
    • 35248872610 scopus 로고    scopus 로고
    • RFID systems and security and privacy implications
    • Proc. of CHES'02, Springer-Verlag
    • S. Sarma, S. Weis, and D. Engels. RFID systems and security and privacy implications. In: Proc. of CHES'02, LNCS 2523, pp. 454-469. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2523 , pp. 454-469
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 20
    • 33845386166 scopus 로고    scopus 로고
    • Lightweight authentication protocols for low-cost RFID, tags
    • I. Vajda and L. Buttyan. Lightweight authentication protocols for low-cost RFID, tags. In: Proc. of UBICOMP'03, 2003.
    • (2003) Proc. of UBICOMP'03
    • Vajda, I.1    Buttyan, L.2
  • 21
    • 33144480778 scopus 로고    scopus 로고
    • Security parallels between people and pervasive devices
    • IEEE Computer Society Press
    • S. Weis. Security parallels between people and pervasive devices. In: Proc. of PERSEC'05, pp. 105-109. IEEE Computer Society Press, 2005.
    • (2005) Proc. of PERSEC'05 , pp. 105-109
    • Weis, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.