메뉴 건너뛰기




Volumn , Issue , 2010, Pages 13-18

RFID survivability quantification and attack modeling

Author keywords

Adversary; Modeling; Quantification; Rfid; Survivability

Indexed keywords

ADVERSARY MODELING; ATTACK STRATEGIES; CRITICAL SERVICE; DIFFERENT ATTACKS; DIFFERENT EFFECTS; RFID SYSTEMS; STOCHASTIC PROCESS ALGEBRAS;

EID: 77952380163     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1741866.1741870     Document Type: Conference Paper
Times cited : (4)

References (15)
  • 2
    • 0003449736 scopus 로고    scopus 로고
    • Survivable network systems: An emerging discipline
    • Software Engineering Institute, Carnegie Mellon University
    • R. Ellison, D. Fisher, R. Linger, and H. Lipson, "Survivable Network Systems: An Emerging Discipline", Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, 1997.
    • (1997) Technical Report CMU/SEI-97-TR-013
    • Ellison, R.1    Fisher, D.2    Linger, R.3    Lipson, H.4
  • 4
    • 33748108997 scopus 로고    scopus 로고
    • Dependability through assured reconfiguration in embedded systems software
    • July
    • E. Strunk and J. Knight, "Dependability Through Assured Reconfiguration in Embedded Systems Software", IEEE Transactions on Dependable and Secure Computing, Vol.3, No.3, pp. 172-187, July 2006.
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.3 , pp. 172-187
    • Strunk, E.1    Knight, J.2
  • 5
    • 0034228685 scopus 로고    scopus 로고
    • Reliability and survivability of wireless and mobile networks
    • July
    • A. Snow, U. Varshney, and A. Malloy, "Reliability and Survivability of Wireless and Mobile Networks", IEEE Computer, 33(7), pp. 49-55, July 2000.
    • (2000) IEEE Computer , vol.33 , Issue.7 , pp. 49-55
    • Snow, A.1    Varshney, U.2    Malloy, A.3
  • 7
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • S. Piramuthu, "Protocols for RFID Tag/Reader Authentication", Decision Support Systems, (43) pp. 897-914, 2007.
    • (2007) Decision Support Systems , vol.43 , pp. 897-914
    • Piramuthu, S.1
  • 8
    • 38149056913 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • December 4-7, Raleigh, NC, USA
    • C. Lim, and T. Kwon, "Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer", The 8th Conference on Information and Communications Security, December 4-7, 2006, Raleigh, NC, USA.
    • (2006) The 8th Conference on Information and Communications Security
    • Lim, C.1    Kwon, T.2
  • 9
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • C. Boyd (ed.), Lecture Notes in Computer Science, Springer-Verlag
    • N. Hopper, and M. Blum, "Secure Human Identification Protocols", In C. Boyd (ed.) Advances in Cryptology - ASIA CRYPT 2001, Vol.2248, Lecture Notes in Computer Science, pp. 52-66, Springer-Verlag, 2001.
    • (2001) Advances in Cryptology - ASIA CRYPT 2001 , vol.2248 , pp. 52-66
    • Hopper, N.1    Blum, M.2
  • 10
    • 33746104831 scopus 로고    scopus 로고
    • Parallel and concurrent security of the hb and hb++ protocols
    • Lecture Notes in Computer Science, Springer
    • J. Katz, and J. Shin, "Parallel and Concurrent Security of the HB and HB++ Protocols", Advances in Cryptology - EURO CRYPT 2006, Vol.4004, Lecture Notes in Computer Science, pp. 73-87, Springer, 2006.
    • (2006) Advances in Cryptology - EURO CRYPT 2006 , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.2
  • 11
    • 14844290165 scopus 로고    scopus 로고
    • Enhancing RFID privacy via antenna energy analysis
    • November, Boston, USA
    • K. Fishkin, and S. Roy, "Enhancing RFID Privacy via Antenna Energy Analysis", MIT RFID Privacy Workshop, November 15, 2003, Boston, USA.
    • (2003) MIT RFID Privacy Workshop , vol.15
    • Fishkin, K.1    Roy, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.