메뉴 건너뛰기




Volumn , Issue , 2010, Pages 182-188

Efficient and practical authentication of PUF-based RFID tags in supply chains

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; DIGITAL STORAGE; HARDWARE SECURITY; RADIO FREQUENCY IDENTIFICATION (RFID); SUPPLY CHAINS;

EID: 77956425492     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RFID-TA.2010.5529941     Document Type: Conference Paper
Times cited : (42)

References (17)
  • 2
    • 74549123338 scopus 로고    scopus 로고
    • The dark side of security by obscurity and cloning MiFare classic rail and building passes anywhere, anytime
    • N. T. Courtois. The dark side of security by obscurity and cloning MiFare classic rail and building passes anywhere, anytime. Cryptology ePrint, 2009/137.
    • (2009) Cryptology EPrint , pp. 137
    • Courtois, N.T.1
  • 3
    • 49049105769 scopus 로고    scopus 로고
    • Design and implementation of PUF-based "unclonable" RFID ICs for anti- counterfeiting and security applications
    • S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal. Design and implementation of PUF-based "unclonable "RFID ICs for anti- counterfeiting and security applications. IEEE RFID, 2008.
    • (2008) IEEE RFID
    • Devadas, S.1    Suh, E.2    Paral, S.3    Sowell, R.4    Ziola, T.5    Khandelwal, V.6
  • 5
    • 77956444009 scopus 로고    scopus 로고
    • FIPS. Secure hash standard. PUB 180-181, 1995
    • FIPS. Secure hash standard. PUB 180-181, 1995.
  • 9
    • 77956424716 scopus 로고    scopus 로고
    • A fuzzy commitment scheme
    • A. Juels and M. Wattenberg. A fuzzy commitment scheme. In CCS, 1999.
    • (1999) CCS
    • Juels, A.1    Wattenberg, M.2
  • 10
    • 33749011985 scopus 로고    scopus 로고
    • Disabling RFID tags with visible confirmation: Clipped tags are silenced
    • G. Karjoth and P. A. Moskowitz. Disabling RFID tags with visible confirmation: clipped tags are silenced. In WPES, 2005.
    • (2005) WPES
    • Karjoth, G.1    Moskowitz, P.A.2
  • 11
    • 62349124225 scopus 로고    scopus 로고
    • A simple and cost-effective RFID tag-reader mutual authentication scheme
    • D. Konidala, Z. Kim, and K. Kim. A simple and cost-effective RFID tag-reader mutual authentication scheme. In RFIDSec, 2007.
    • (2007) RFIDSec
    • Konidala, D.1    Kim, Z.2    Kim., K.3
  • 12
    • 70349729433 scopus 로고    scopus 로고
    • Efficient RFID authentication protocols based on pseudorandom sequence generators
    • J. Lee and Y. Yeom. Efficient RFID authentication protocols based on pseudorandom sequence generators. Cryptology ePrint, 2008/343.
    • (2008) Cryptology ePrint , pp. 343
    • Lee, J.1    Yeom, Y.2
  • 13
    • 33846436953 scopus 로고    scopus 로고
    • Undeniable replies for database queries
    • M. Roos, A. Buldas, and J.Willemson. Undeniable replies for database queries. In DB&IS, 2002.
    • (2002) DB&IS
    • Roos, M.1    Buldas, A.2    Willemson, J.3
  • 14
    • 38049041831 scopus 로고    scopus 로고
    • Authenticated data structures
    • R. Tamassia. Authenticated data structures. In ESA, 2003.
    • (2003) ESA
    • Tamassia, R.1
  • 15
    • 34547618979 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting
    • P. Tuyls and L. Batina. RFID-tags for anti-counterfeiting. In RSA, 2006.
    • (2006) RSA
    • Tuyls, P.1    Batina., L.2
  • 17
    • 77956431123 scopus 로고    scopus 로고
    • Implementing high-level counterfeit security using RFID and PKI
    • A.Wallstabe and H. Pohl. Implementing high-level counterfeit security using RFID and PKI. In RFID SysTech, 2007.
    • (2007) RFID SysTech
    • Wallstabe, A.1    Pohl, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.