메뉴 건너뛰기




Volumn , Issue , 2010, Pages 66-69

A HMAC-based RFID authentication protocol

Author keywords

Authentication protocol; HMAC; RFID

Indexed keywords

AUTHENTICATION PROTOCOLS; AUTOMATIC IDENTIFICATION; HMAC; LIGHTWEIGHT AUTHENTICATION PROTOCOLS; MALICIOUS ATTACK; NEW PROTOCOL; NON-CONTACT; REPLAY ATTACK; RF-ID TAGS; RFID; RFID AUTHENTICATION; RFID SYSTEMS; SECURITY AND PERFORMANCE; SPOOFING ATTACKS; STORAGE CAPACITY; STORAGE SPACES; WIRELESS COMMUNICATION CHANNELS; XOR OPERATION;

EID: 77956166753     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IEEC.2010.5533266     Document Type: Conference Paper
Times cited : (7)

References (9)
  • 1
    • 35248872610 scopus 로고    scopus 로고
    • RFID systems and security and privacy implications
    • Workshop on Cryptographic Hardware and Em-bedded Systems, volume, MIT
    • S. Sarma, S. Weis, and D. Engels, "RFID systems and security and privacy implications," In Workshop on Cryptographic Hardware and Em-bedded Systems, volume 2523 of Lecture Notes in omputer Science, MIT, pp. 454-470, 2002.
    • (2002) Lecture Notes in Omputer Science , vol.2523 , pp. 454-470
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 2
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • International Conference on Security in Pervasive Computing(SPC 2003) , Berlin: Springer-Verlag
    • S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems, " International Conference on Security in Pervasive Computing(SPC 2003),volume 2802 of Lecure Notes in Computer Science,Berlin: Springer-Verlag, pp. 201-212, 2003.
    • (2003) Lecure Notes in Computer Science , vol.2802 , pp. 201-212
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 3
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • International Conference on Security in Pervasive Computing(SPC 2005), Berlin: Springer-Verlag
    • K. Rhee, J. Kwak, S. Kim, and D. Won,"Challenge-response based RFID authentication protocol for distributed database environment,"International Conference on Security in Pervasive Computing(SPC 2005),volume 3450 of Lecure Notes in Computer Science,Berlin: Springer-Verlag, pp.70-84,2005.
    • (2005) Lecure Notes in Computer Science , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 7
    • 65349109748 scopus 로고    scopus 로고
    • Research on hash-based RFID security authentication protocol
    • Beijing. (in Chinese)
    • Ding Zhenhua, Li Jintao and Feng Bo, "Research on Hash-Based RFID Security Authentication Protocol," Journal OF Computer research and development, Beijing, vol.46, pp.583-592, 2009. (in Chinese)
    • (2009) Journal of Computer Research and Development , vol.46 , pp. 583-592
    • Ding, Z.1    Li, J.2    Feng, B.3
  • 8
    • 34250631302 scopus 로고    scopus 로고
    • An anti-collision RFID algorithm based on the dynamic binary
    • Shanghai. (in Chinese)
    • Ju Weicheng and Yu Chengfang, "An Anti-Collision RFID Algorithm Based on the Dynamic Binary," Journal OF FuDan University, Shanghai, vol.44, p.46-50, 2005. (in Chinese)
    • (2005) Journal of FuDan University , vol.44 , pp. 46-50
    • Ju, W.1    Yu, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.