메뉴 건너뛰기




Volumn , Issue , 2010, Pages 75-88

Formal verification of privacy for RFID systems

Author keywords

[No Author keywords available]

Indexed keywords

APPLIED PI CALCULUS; ELECTRONIC PASSPORTS; FORMAL MODEL; FORMAL VERIFICATIONS; GENERIC CLASS; IDENTIFICATION PROTOCOL; PRIVACY CONCERNS; RF-ID TAGS; RFID SYSTEMS; SUFFICIENT AND NECESSARY CONDITION; UNLINKABILITY;

EID: 77957584097     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.13     Document Type: Conference Paper
Times cited : (52)

References (22)
  • 1
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to "privacy-friendly" tags
    • MIT, Massachusetts, USA, November
    • M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic approach to "privacy-friendly" tags, " in RFID Privacy Workshop, MIT, Massachusetts, USA, November 2003.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 3
    • 17644411480 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • M. Abadi and C. Fournet, "Mobile values, new names, and secure communication, " in POPL, 2001, pp. 104-115.
    • (2001) POPL , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 5
  • 10
    • 33744939250 scopus 로고    scopus 로고
    • Adversary model for radio frequency identification
    • Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, September
    • G. Avoine, "Adversary model for radio frequency identification, " Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, Technical Report LASEC-REPORT-2005- 001, September 2005.
    • (2005) Swiss Federal Institute of Technology (EPFL), Technical Report LASEC-REPORT-2005-001
    • Avoine, G.1
  • 11
  • 12
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacytype properties of electronic voting protocols
    • S. Delaune, S. Kremer, and M. Ryan, "Verifying privacytype properties of electronic voting protocols, " Journal of Computer Security, vol. 17, no. 4, pp. 435-487, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 435-487
    • Delaune, S.1    Kremer, S.2    Ryan, M.3
  • 13
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • ser. Lecture Notes in Computer Science, D. Hutter, G. Müller, W. Stephan, and M. Ullmann, Eds., Boppard, Germany: Springer-Verlag, March
    • S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems, " in International Conference on Security in Pervasive Computing - SPC 2003, ser. Lecture Notes in Computer Science, D. Hutter, G. Müller, W. Stephan, and M. Ullmann, Eds., vol. 2802. Boppard, Germany: Springer-Verlag, March 2003, pp. 454-469.
    • (2003) International Conference on Security in Pervasive Computing - SPC 2003 , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 14
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society
    • B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules, " in CSFW. IEEE Computer Society, 2001, pp. 82-96.
    • (2001) CSFW , pp. 82-96
    • Blanchet, B.1
  • 15
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • IEEE Computer Society
    • -, "Automatic proof of strong secrecy for security protocols, " in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2004, pp. 86-100.
    • (2004) IEEE Symposium on Security and Privacy , pp. 86-100
  • 18
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • ser. Lecture Notes in Computer Science, Kuching, Malaysia: Springer-Verlag, December
    • S. Vaudenay, "On privacy models for RFID, " in Advances in Cryptology - Asiacrypt 2007, ser. Lecture Notes in Computer Science, vol. 4833. Kuching, Malaysia: Springer-Verlag, December 2007, pp. 68-87.
    • (2007) Advances in Cryptology - Asiacrypt 2007 , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 19
    • 77957559043 scopus 로고    scopus 로고
    • Analysing unlinkability and anonymity using the applied pi calculus
    • to appear
    • M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, "Analysing unlinkability and anonymity using the applied pi calculus, " in proceedings of CSF 2010, 2010, to appear.
    • (2010) Proceedings of CSF 2010
    • Arapinis, M.1    Chothia, T.2    Ritter, E.3    Ryan, M.4
  • 21
    • 50249164303 scopus 로고    scopus 로고
    • Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
    • Washington, DC, USA: IEEE Computer Society
    • M. Backes, M. Maffei, and D. Unruh, "Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, " in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2008, pp. 202- 215.
    • (2008) SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy , pp. 202-215
    • Backes, M.1    Maffei, M.2    Unruh, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.