메뉴 건너뛰기




Volumn , Issue , 2009, Pages 215-230

CCCP: Secure remote storage for computational RFIDs

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; RADIO BROADCASTING; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 77950320989     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (34)
  • 4
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • Springer-Verlag
    • BLACK, J., HALEVI, S., KRAWCZYK, H., KROVETZ, T., AND ROGAWAY, P. UMAC: Fast and secure message authentication. In CRYPTO (1999), Springer-Verlag, pp. 216–233.
    • (1999) CRYPTO , pp. 216-233
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 6
    • 0020913618 scopus 로고
    • On computationally secure authentication tags requiring short secret shared keys
    • BRASSARD, G. On computationally secure authentication tags requiring short secret shared keys. In CRYPTO (1982), pp. 79–86.
    • (1982) CRYPTO , pp. 79-86
    • Brassard, G.1
  • 14
    • 84942512232 scopus 로고    scopus 로고
    • Square hash: Fast message authentication via optimized universal hash functions
    • In Springer-Verlag
    • ETZEL, M., PATEL, S., AND RAMZAN, Z. Square hash: Fast message authentication via optimized universal hash functions. In In Proc. CRYPTO 99, Lecture Notes in Computer Science (1999), Springer-Verlag, pp. 234–251.
    • (1999) Proc. CRYPTO 99, Lecture Notes in Computer Science , pp. 234-251
    • Etzel, M.1    Patel, S.2    Ramzan, Z.3
  • 18
    • 0024627110 scopus 로고
    • Degradations due to hole trapping in flash memory cells
    • March IEEE
    • HADDAD, S., CHANG, C., SWAMINATHAN, B., AND LIEN, J. Degradations due to hole trapping in flash memory cells. In Electron Device Letters (March 1989), IEEE, pp. 117–119.
    • (1989) Electron Device Letters , pp. 117-119
    • Haddad, S.1    Chang, C.2    Swaminathan, B.3    Lien, J.4
  • 20
    • 85076265268 scopus 로고    scopus 로고
    • ca. B.C
    • HOMER. Odyssey, vol. XI. ca. 750 B.C.
    • Odyssey , vol.11 , pp. 750
    • Homer1
  • 21
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • February
    • JUELS, A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24, 2 (February 2006), 381–394.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 31
    • 50249161524 scopus 로고    scopus 로고
    • SQUASH—a new MAC with provable security properties for highly constrained devices such as RFID tags
    • Springer-Verlag
    • SHAMIR, A. SQUASH—a new MAC with provable security properties for highly constrained devices such as RFID tags. In Proceedings of the 15th International Workshop on Fast Software Encryption (FSE) (2008), Springer-Verlag, pp. 144–157.
    • (2008) Proceedings of the 15th International Workshop on Fast Software Encryption (FSE) , pp. 144-157
    • Shamir, A.1
  • 33
    • 85076319036 scopus 로고    scopus 로고
    • Trusted computing group. http://www.trustedcomputinggroup.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.