메뉴 건너뛰기




Volumn 5804 LNCS, Issue , 2009, Pages 76-87

Revisiting DoS attacks and privacy in RFID-enabled networks

Author keywords

[No Author keywords available]

Indexed keywords

DOS ATTACKS; HARDWARE FEATURES; IDENTIFICATION PROTOCOL; IMPOSSIBILITY RESULTS; PRIVACY MODELS; REAL-WORLD; REAL-WORLD SCENARIO; RFID PROTOCOLS; RFID SECURITY; SIDE CHANNEL ATTACK; SYMMETRIC KEY CRYPTOGRAPHY;

EID: 77049116572     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-05434-1_9     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 1
    • 77049119125 scopus 로고    scopus 로고
    • Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/049 (2005), http://eprint.iacr.org/2005/ 049
    • Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/049 (2005), http://eprint.iacr.org/2005/ 049
  • 2
    • 34748832806 scopus 로고    scopus 로고
    • Defining strong privacy for RFID. Cryptology ePrint Archive
    • Report 2006/137
    • Juels, A.,Weis, S.A.: Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006/137 (2006), http://eprint.iacr.org/2006/137
    • (2006)
    • Juels, A.1    Weis, S.A.2
  • 5
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 6
    • 57049184162 scopus 로고    scopus 로고
    • RFID privacy models revisited
    • Jajodia, S, Lopez, J, eds, ESORICS 2008, Springer, Heidelberg
    • Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-266. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 251-266
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 12
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, p. 531. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531
    • Bellare, M.1    Namprempre, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.