메뉴 건너뛰기




Volumn , Issue , 2009, Pages 187-194

Performance analysis of the simple lightweight authentication protocol

Author keywords

Authentication; Lightweight protocol; RFID

Indexed keywords

AUTHENTICATION ALGORITHM; AUTHENTICATION SOLUTIONS; AUTHENTICATION TIME; LARGE SYSTEM; LIGHTWEIGHT AUTHENTICATION PROTOCOLS; LIGHTWEIGHT PROTOCOL; LIGHTWEIGHT PROTOCOLS; PERFORMANCE ANALYSIS; PERFORMANCE CHARACTERISTICS; RADIO FREQUENCY IDENTIFICATION TECHNOLOGY; SECURITY AND PERFORMANCE; SECURITY ISSUES; SIDE EFFECT; SIMULATION ENVIRONMENT; THEORETICAL RESULT;

EID: 77955111668     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1821748.1821786     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 3
    • 2942556410 scopus 로고    scopus 로고
    • Radio-frequency identification: Security risks and challenges
    • Spring
    • Sarma, S., Weis, S. and Engels, D. Radio-Frequency Identification: Security Risks and Challenges, Cryptobytes, RSA Laboratories, Vol. 6. Issue 1., pp. 2-9., Spring 2003.
    • (2003) Cryptobytes, RSA Laboratories , vol.6 , Issue.1 , pp. 2-9
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 6
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • Washington, DC, USA, Oct
    • Molnar, D. and Wagner, D. Privacy and Security in Library RFID: Issues, Practices, and Architectures, Conference on Computer and Communications Security, pp. 210-219, Washington, DC, USA, Oct 2004.
    • (2004) Conference on Computer and Communications Securit , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 7
    • 84940024494 scopus 로고    scopus 로고
    • Quantifying information leakage in tree-based hash protocols
    • Raleigh, North Carolina, USA, Dec
    • Nohl, K. and Evans, D. Quantifying Information Leakage in Tree-Based Hash Protocols, Conference on Information and Communications Security - ICICS'06, pp. 228-237, Raleigh, North Carolina, USA, Dec 2006.
    • (2006) Conference on Information and Communications Security - ICICS'0 , pp. 228-237
    • Nohl, K.1    Evans, D.2
  • 11
    • 77955101104 scopus 로고    scopus 로고
    • OMNeT++ Community Site. http://www.omnetpp.org
  • 13
    • 67249143972 scopus 로고    scopus 로고
    • Mutual authentication protocol for low computational capacity RFID systems
    • New Orleans, LA, USA, 30 Nov - 4 Dec
    • Gy. Gódor, M. Antal, S. Imre, Mutual Authentication Protocol for Low Computational Capacity RFID Systems, IEEE Globecom 2008 CCNS, New Orleans, LA, USA, 30 Nov - 4 Dec, 2008
    • (2008) IEEE Globecom 2008 CCN
    • Gy. Gódor1    Antal, M.2    Imre, S.3
  • 16
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • Lim, C. H., and Kwon, T. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer, Lecture Notes in Computer Science, 2006
    • (2006) Lecture Notes in Computer Science
    • Lim, C.H.1    Kwon, T.2
  • 17
    • 34247218520 scopus 로고    scopus 로고
    • Tomoyuki asano and kwangjo kim RFID mutual authentication scheme based on synchronized secret information
    • Sangshin Lee, Tomoyuki Asano and Kwangjo Kim RFID Mutual Authentication Scheme based on Synchronized Secret Information, The 2006 Symposium on Cryptography and Information Security (SCIS), 2006.
    • (2006) The 2006 Symposium on Cryptography and Information Security (SCIS)
    • Lee, S.1
  • 19
    • 77955119065 scopus 로고    scopus 로고
    • Retrieved March 22, 2009, from
    • Stamatiou, P. Privacy Implications of RFID Tags, 2007. Retrieved March 22, 2009, from http://paulstamatiou.com/wp-content/uploads/2007/11/pstam-rfid- paper.pdf
    • (2007) Privacy Implications of RFID Tags
    • Stamatiou, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.