메뉴 건너뛰기




Volumn 5, Issue 2-3, 2010, Pages 135-146

Looking at a class of RFID APs through GNY logic

Author keywords

Authentication protocol; CRAP; Encryption; Formal method; GNY logic; Hash; LCAP; Network security; O TRAP; OHLCAP; RFID; YA TRAP

Indexed keywords

AUTHENTICATION; COMPUTER CIRCUITS; CRYPTOGRAPHY; FORMAL METHODS; HASH FUNCTIONS; NETWORK PROTOCOLS; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 77949713022     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2010.032212     Document Type: Article
Times cited : (13)

References (36)
  • 2
    • 77949676803 scopus 로고    scopus 로고
    • Key agreement, the algebraic eraserTM, and lightweight cryptography
    • Anshel, I., Anshel, M., Goldfeld, D. and Lemieux, S. (2006) 'Key agreement, the algebraic eraserTM, and lightweight cryptography', J. Contemporary Mathematics, Vol.418, pp.1-34.
    • (2006) J. Contemporary Mathematics , vol.418 , pp. 1-34
    • Anshel, I.1    Anshel, M.2    Goldfeld, D.3    Lemieux, S.4
  • 9
    • 33744940544 scopus 로고    scopus 로고
    • Efficient RFID authentication protocol for ubiquitous computing environment
    • Nagasaki, Japan
    • Choi, E.Y., Lee, S.M. and Lee, D.H. (2005) 'Efficient RFID authentication protocol for ubiquitous computing environment', Proc. SECUBIQ'05, LNCS 3823, Nagasaki, Japan, pp.945-954.
    • (2005) Proc SECUBIQ'05, LNCS 3823 , pp. 945-954
    • Choi, E.Y.1    Lee, S.M.2    Lee, D.H.3
  • 11
    • 51149098609 scopus 로고    scopus 로고
    • Improved lightweight mutual authentication protocol for RFID systems
    • Wireless and Mobile Networking, Boston, Springer
    • Gódor, G. and Antal, M. (2008) 'Improved lightweight mutual authentication protocol for RFID systems', IFIP International Federation for Information Processing, Vol.284, Wireless and Mobile Networking, Boston, Springer, pp.471-482.
    • (2008) IFIP International Federation for Information Processing , vol.284 , pp. 471-482
    • Gódor, G.1    Antal, M.2
  • 13
    • 38549103545 scopus 로고    scopus 로고
    • Security analysis and enhancement of one-way hash based low-cost authentication protocol
    • Nanjing, China
    • Ha, J., Moon, S., Nieto, J.M. and Boyd, C. (2007) 'Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)', Proc. PAKDD'07, LNAI 4819, Nanjing, China, pp.574-583.
    • (2007) Proc PAKDD'07, LNAI 4819 , pp. 574-583
    • Ha, J.1    Moon, S.2    Nieto, J.M.3    Boyd, C.4
  • 14
    • 45749153036 scopus 로고    scopus 로고
    • PUF-HB: A tamperresilient HB based authentication protocol
    • New York, NY
    • Hammouri, G. and Sunar, B. (2008) 'PUF-HB: a tamperresilient HB based authentication protocol', Proc. ACNS'08, LNCS 5037, New York, NY, pp.346-365.
    • (2008) Proc ACNS'08, LNCS 5037 , pp. 346-365
    • Hammouri, G.1    Sunar, B.2
  • 15
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • Orlando, FL
    • Henrici, D. and Muller, D. (2004) 'Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers', Proc. IEEE PERCOMW'04, Orlando, FL, pp.149-153.
    • (2004) Proc IEEE PERCOMW'04 , pp. 149-153
    • Henrici, D.1    Muller, D.2
  • 16
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Gold Coast, Australia
    • Hopper, N. and Blum, M. (2001) 'Secure human identification protocols', Proc. ASIACRYPT'01, LNCS 2248, Gold Coast, Australia, pp.52-66.
    • (2001) Proc ASIACRYPT'01, LNCS 2248 , pp. 52-66
    • Hopper, N.1    Blum, M.2
  • 19
    • 77951595476 scopus 로고    scopus 로고
    • Unidirectional key distribution across time and space with applications to RFID security
    • San Jose, CA
    • Juels, A., Pappu, R. and Parno, B. (2008) 'Unidirectional key distribution across time and space with applications to RFID security', Proc. USENIX Security Symposium 2008, San Jose, CA, pp.75-90.
    • (2008) Proc USENIX Security Symposium 2008 , pp. 75-90
    • Juels, A.1    Pappu, R.2    Parno, B.3
  • 20
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Santa Barbara, CA
    • Juels, A. and Weis, S. (2005) 'Authenticating pervasive devices with human protocols', Proc. CRYPTO'05, LNAI 3621, Santa Barbara, CA, pp.293-308.
    • (2005) Proc CRYPTO'05, LNAI 3621 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 21
    • 34748848124 scopus 로고    scopus 로고
    • Universally composable and forward-secure RFID authentication and authenticated key exchange
    • Singapore
    • Le, T.V., Burmester, M. and Medeiros, B. (2007) 'Universally composable and forward-secure RFID authentication and authenticated key exchange', Proc. ASIACCS'07, ACM, Singapore, pp.242-252.
    • (2007) Proc ASIACCS'07, ACM , pp. 242-252
    • Le, T.V.1    Burmester, M.2    Medeiros, B.3
  • 22
    • 24944582157 scopus 로고    scopus 로고
    • Efficient authentication for low-cost RFID systems
    • Singapore
    • Lee, S.M., Hwang Y.J., Lee, D.H. and Lim, J.I. (2005) 'Efficient authentication for low-cost RFID systems', Proc. ICCSA'05, LNCS 3480, Singapore, pp.619-627.
    • (2005) Proc ICCSA'05, LNCS 3480 , pp. 619-627
    • Lee, S.M.1    Hwang, Y.J.2    Lee, D.H.3    Lim, J.I.4
  • 24
    • 0029719080 scopus 로고    scopus 로고
    • Some new attacks upon security protocols
    • IEEE Computer Society Press, Venice, Italy
    • Lowe, G. (1996) 'Some new attacks upon security protocols', Proc. Ninth IEEE Computer Security Foundations Workshop - CSFW'96, IEEE Computer Society Press, Venice, Italy, pp.162-169.
    • (1996) Proc Ninth IEEE Computer Security Foundations Workshop - CSFW'96 , pp. 162-169
    • Lowe, G.1
  • 25
    • 84886218215 scopus 로고    scopus 로고
    • Public key cryptography and RFID tags
    • San Francisco, CA
    • McLoone, M. and Robshaw, M.J.B. (2007) 'Public key cryptography and RFID tags', Proc. CT-RSA'07, LNCS 4377, San Francisco, CA, pp.372-384.
    • (2007) Proc CT-RSA'07, LNCS 4377 , pp. 372-384
    • McLoone, M.1    Robshaw, M.J.B.2
  • 26
    • 0030084918 scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows, C. (1994) 'The NRL protocol analyzer: an overview', J. Logic Program, Vol.26, No.2, pp.113-131.
    • (1994) J. Logic Program , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 27
    • 0030705405 scopus 로고    scopus 로고
    • Automated analysis of cryptographic protocols using murphi
    • IEEE Computer Society Press, Silver Spring, MD
    • Mitchell, J., Mitchell, M. and Stern, U. (1997) 'Automated analysis of cryptographic protocols using murphi', Proc. 16th IEEE Symposium on Security and Privacy - SSP'97, IEEE Computer Society Press, Silver Spring, MD, pp.141-151.
    • (1997) Proc. 16th IEEE Symposium on Security and Privacy - SSP'97 , pp. 141-151
    • Mitchell, J.1    Mitchell, M.2    Stern, U.3
  • 29
    • 24644501824 scopus 로고    scopus 로고
    • Callenge-response based RFID authentication protocol for distributed database environment
    • Boppard, Germany
    • Rhee, K., Kwak, J., Kim, S. and Won, D. (2005) 'Callenge-response based RFID authentication protocol for distributed database environment', Proc. SPC'05, LNCS 3450, Boppard, Germany, pp.70-84.
    • (2005) Proc SPC'05, LNCS 3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 30
    • 35248872610 scopus 로고    scopus 로고
    • RFID systems and security and privacy implications
    • Redwood City, CA
    • Sarma, S.E., Weis, S.A. and Engels, D.W. (2002) 'RFID systems and security and privacy implications', Proc. CHES'02, LNCS 2523, Redwood City, CA, pp.454-469.
    • (2002) Proc CHES'02, LNCS 2523 , pp. 454-469
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 31
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • Schneider, S. (1998) 'Verifying authentication protocols in CSP', IEEE Transactions on Software Engineering, Vol.24, No.9, pp.741-758.
    • (1998) IEEE Transactions on Software Engineering , vol.24 , Issue.9 , pp. 741-758
    • Schneider, S.1
  • 32
    • 50249161524 scopus 로고    scopus 로고
    • SQUASH - A new MAC with provable security properties for highly constrained devices such as RFID tags
    • Lausanne, Switzerland
    • Shamir, A. (2008) 'SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags', Proc. FSE'08, LNCS 5086, Lausanne, Switzerland, pp.144-157.
    • (2008) Proc FSE'08, LNCS 5086 , pp. 144-157
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.