메뉴 건너뛰기




Volumn 3, Issue 1, 2010, Pages 58-70

eRIPP-FS: Enforcing privacy and security in RFID

Author keywords

Authentication; Forward secrecy; Privacy; RFID; Synchronization; Tag identification

Indexed keywords

AUTHENTICATION; CHAINS; DATA PRIVACY; NETWORK SECURITY; RADIO FREQUENCY IDENTIFICATION (RFID); SIDE CHANNEL ATTACK; SYNCHRONIZATION;

EID: 77149128350     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.120     Document Type: Article
Times cited : (5)

References (28)
  • 4
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • Brumley D, Boneh D. Remote timing attacks are practical. Computer Networks 2005; 48(5): 701-716.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 10
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Juels A, Weis S. Authenticating pervasive devices with human protocols. Advances in Cryptology (CRYPTO'05), LNCS 2005; 3126: 293-308.
    • (2005) Advances In Cryptology (crypto'05), Lncs , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 16
    • 34547630116 scopus 로고    scopus 로고
    • Secure anonymous RFID authentication protocols
    • Florida State University, Department of Computer Science, Tallahassee, Florida, USA
    • Chatmon C, van Le T, Burmester M. Secure anonymous RFID authentication protocols. Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA, 2006.
    • (2006) Technical Report Tr-060112
    • Chatmon, C.1    van Le, T.2    Burmester, M.3
  • 22
    • 67650132302 scopus 로고    scopus 로고
    • Low-cost SHA-1 hash function architecture for RFID Tags
    • O'Neill (McLoone) M. Low-cost SHA-1 hash function architecture for RFID Tags. In Conference on RFID Security, 2008.
    • (2008) Conference On Rfid Security
    • O'Neill, M.1
  • 24
    • 70449590530 scopus 로고    scopus 로고
    • Squash: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags
    • Shamir A. Squash: a new one-way hash function with provable security properties for highly constrained devices such as RFID tags. In Conference on RFID Security, 2007.
    • (2007) Conference On Rfid Security
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.