메뉴 건너뛰기




Volumn , Issue , 2008, Pages 75-90

Unidirectional key distribution across time and space with applications to RFID security

Author keywords

[No Author keywords available]

Indexed keywords

SUPPLY CHAINS;

EID: 77951595476     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (63)

References (33)
  • 1
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS, pages 62–73, 1993.
    • (1993) ACM CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 77950222301 scopus 로고    scopus 로고
    • Robust computational secret sharing and a unified account of classical secret-sharing goals
    • M. Bellare and P. Rogaway. Robust computational secret sharing and a unified account of classical secret-sharing goals. In ACM CCS, 2007.
    • (2007) ACM CCS
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • G. Blakley. Safeguarding cryptographic keys. In AFIPS Conference Proceedings, volume 48, pages 313–317, 1979.
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.1
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586–615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 0026992660 scopus 로고
    • Some improved bounds on the information rate of perfect secret sharing schemes
    • E. F. Brickell and D. R. Stinson. Some improved bounds on the information rate of perfect secret sharing schemes. Journal of Cryptology, 5:153–166, 1992.
    • (1992) Journal of Cryptology , vol.5 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 13
    • 84887425133 scopus 로고    scopus 로고
    • EPC Global
    • EPC Global. EPC® Item Level Tagging Joint Requirements Group. EPC Global, 2007.
    • (2007) EPC Global
  • 14
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometry codes
    • V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Transactions on Information Theory, 45(6):1757–1767, 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 15
    • 33749028998 scopus 로고    scopus 로고
    • Strengthing EPC tags against cloning
    • ACM Press
    • A. Juels. Strengthing EPC tags against cloning. In ACM Workshop on Wireless Security (WiSe), pages 67–76. ACM Press, 2005.
    • (2005) ACM Workshop on Wireless Security (WiSe) , pp. 67-76
    • Juels, A.1
  • 17
  • 19
    • 2642529529 scopus 로고    scopus 로고
    • Directions in polynomial reconstruction based cryptography
    • A. Kiayias and M. Yung. Directions in polynomial reconstruction based cryptography. IEICE Transactions, E87-A(5):978–985, 2004.
    • (2004) IEICE Transactions , vol.E87-A , Issue.5 , pp. 978-985
    • Kiayias, A.1    Yung, M.2
  • 20
    • 85028775022 scopus 로고
    • Secret sharing made short
    • New York, NY, USA, Springer-Verlag New York, Inc
    • H. Krawczyk. Secret sharing made short. In Advances in Cryptology: Proceedings of CRYPTO, pages 136–146, New York, NY, USA, 1994. Springer-Verlag New York, Inc.
    • (1994) Advances in Cryptology: Proceedings of CRYPTO , pp. 136-146
    • Krawczyk, H.1
  • 22
    • 38349076613 scopus 로고    scopus 로고
    • RFID privacy using spatially distributed shared secrets
    • LNCS, Berlin Heidelberg New York, Nov. Springer. To appear
    • M. Langheinrich and R. Marti. RFID privacy using spatially distributed shared secrets. In Proceedings of UCS 2007, LNCS, Berlin Heidelberg New York, Nov. 2007. Springer. (To appear).
    • (2007) Proceedings of UCS 2007
    • Langheinrich, M.1    Marti, R.2
  • 23
    • 84937740421 scopus 로고
    • Shift register synthesis and BCH decoding
    • J. L. Massey. Shift register synthesis and BCH decoding. IEEE Transactions on Information Theory, 15(1):122–127, 1969.
    • (1969) IEEE Transactions on Information Theory , vol.15 , Issue.1 , pp. 122-127
    • Massey, J.L.1
  • 25
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Communications of the ACM, 24(9):583–584, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 26
    • 1942544259 scopus 로고    scopus 로고
    • Some basic properties of general nonperfect secret sharing schemes
    • W. Ogata and K. Kurosawa. Some basic properties of general nonperfect secret sharing schemes. Journal of Universal Computer Science, 4(8), 1998.
    • (1998) Journal of Universal Computer Science , vol.4 , Issue.8
    • Ogata, W.1    Kurosawa, K.2
  • 28
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. Journal SIAM, 8:300–304, 1960.
    • (1960) Journal SIAM , vol.8 , pp. 300-304
    • Reed, I.S.1    Solomon, G.2
  • 29
    • 35348886929 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • Nov
    • P. Rogaway, M. Bellare, and J. Black. OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM TISSEC, Nov. 2001.
    • (2001) ACM TISSEC
    • Rogaway, P.1    Bellare, M.2    Black, J.3
  • 31
    • 84953635000 scopus 로고
    • Description of a new variable-length key, 64-bit block cipher (blowfish)
    • R. J. Anderson, editor, Springer
    • B. Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In R. J. Anderson, editor, FSE, volume 809 of Lecture Notes in Computer Science, pages 191–204. Springer, 1993.
    • (1993) FSE, Volume 809 of Lecture Notes in Computer Science , pp. 191-204
    • Schneier, B.1
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 33
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Springer Verlag
    • F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols, 7th International Workshop. Springer Verlag, 1999.
    • (1999) Security Protocols, 7th International Workshop
    • Stajano, F.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.