메뉴 건너뛰기




Volumn , Issue , 2010, Pages 45-52

Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security

Author keywords

Cryptographic puzzles; Distance bounding protocols; Privacy; RFID security; Traceability; WSBC

Indexed keywords

ANTI-SPAM; BIT COMMITMENT; COMPUTATIONAL EFFORT; NEW APPROACHES; PRIVACY PROTECTION; PUBLIC CONCERN; RFID SECURITY; RFID SYSTEMS; RFID TECHNOLOGY; SECURITY APPLICATION; SECURITY THREATS; TCP SYN FLOODING;

EID: 77953892886     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RFID.2010.5467258     Document Type: Conference Paper
Times cited : (20)

References (41)
  • 1
    • 77953909886 scopus 로고    scopus 로고
    • Bridge Researchers Demo Highly Secure EPC Gen-2 RFID
    • July
    • M. C. 0'Connor. Bridge Researchers Demo Highly Secure EPC Gen-2 RFID. RFID Journal, July 2009.
    • (2009) RFID Journal
    • O'Connor, M.C.1
  • 3
    • 54249156664 scopus 로고    scopus 로고
    • EPassport: Securing International Contacts with Contactless Chips
    • Financial Cryptography and Data Security - FC'08, Springer-Verlag, January
    • G. Avoine, K. Kalach, and J.-J. Quisquater. ePassport: Securing International Contacts with Contactless Chips. In Financial Cryptography and Data Security - FC'08, volume 5143 of Lecture Notes in Computer Science, pages 141-155. Springer-Verlag, January 2008.
    • (2008) Lecture Notes in Computer Science , vol.5143 , pp. 141-155
    • Avoine, G.1    Kalach, K.2    Quisquater, J.-J.3
  • 4
    • 77953896201 scopus 로고    scopus 로고
    • An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
    • G. Avoine and A. Tchamkerten. An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement. In Information Security Conference - ISC'09, September 2009.
    • Information Security Conference - ISC'09, September 2009
    • Avoine, G.1    Tchamkerten, A.2
  • 8
    • 33751546328 scopus 로고    scopus 로고
    • Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 standards
    • February
    • H.-Y. Chien and C.-H. Chen. Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces, Elsevier Science Publishers, 29(2):254-259, February 2007.
    • (2007) Computer Standards & Interfaces, Elsevier Science Publishers , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 9
    • 33744940544 scopus 로고    scopus 로고
    • Efficient RFID Authentication Protocol for Ubiquitous Computing Environment
    • International Workshop on Security in Ubiquitous Computing Systems - SecUbiq 2005 Springer-Verlag, December
    • E. Y. Choi, S. M. Lee, and D. H. Lee. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. In International Workshop on Security in Ubiquitous Computing Systems - SecUbiq 2005, volume 3823 of Lecture Notes in Computer Science, pages 945-954. Springer-Verlag, December 2005.
    • (2005) Lecture Notes in Computer Science , vol.3823 , pp. 945-954
    • Choi, E.Y.1    Lee, S.M.2    Lee, D.H.3
  • 12
  • 22
    • 2942625823 scopus 로고    scopus 로고
    • Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers
    • IEEE, IEEE Computer Society, March
    • D. Henrici and P. Müller. Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers. In International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pages 149-153. IEEE, IEEE Computer Society, March 2004.
    • (2004) International Workshop on Pervasive Computing and Communication Security - PerSec 2004 , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 26
    • 70349940333 scopus 로고    scopus 로고
    • The Swiss-Knife RFID Distance Bounding Protocol
    • Proceedings of International Conference on Information Security and Cryptology - ICISC, Springer-Verlag
    • C H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The Swiss-Knife RFID Distance Bounding Protocol. In Proceedings of International Conference on Information Security and Cryptology - ICISC, LNCS. Springer-Verlag, 2008.
    • (2008) LNCS
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 27
    • 33646815676 scopus 로고    scopus 로고
    • Some attacks against a double length hash proposal
    • ASIACRYPT, Springer-Verlag
    • L Knudsen and F. Muller. Some attacks against a double length hash proposal. In ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 462-473. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 462-473
    • Knudsen, L.1    Muller, F.2
  • 30
    • 33745597876 scopus 로고    scopus 로고
    • A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
    • Selected Areas in Cryptography - SAC 2005, Springer-Verlag, August
    • D. Molnar, A. Soppera, and D. Wagner. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In Selected Areas in Cryptography - SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 276-290. Springer-Verlag, August 2005.
    • (2005) Lecture Notes in Computer Science , vol.3897 , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 40
    • 21144438831 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • International Conference on Security in Pervasive Computing - SPC 2003 Springer-Verlag, March
    • S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of Lecture Notes in Computer Science, pages 454-469. Springer-Verlag, March 2003.
    • (2003) Lecture Notes in Computer Science , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.