메뉴 건너뛰기




Volumn 37, Issue 12, 2010, Pages 7678-7683

Securing RFID systems conforming to EPC class 1 generation 2 standard

Author keywords

Authentication; Gen 2; Privacy; RFID; Security

Indexed keywords

AUTHENTICATION; AUTOMATION; DATA PRIVACY; DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY; RADIO TRANSMISSION;

EID: 77957851534     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2010.04.074     Document Type: Article
Times cited : (99)

References (25)
  • 6
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • Chien, H. Y., & Chen, C. H. (2007). Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards and Interfaces, 29, 254-259.
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 7
    • 85030585094 scopus 로고    scopus 로고
    • Gen 2-The tough questions - Part1
    • Retrieved 10.03.09
    • Diorio, C. (2007). Gen 2-The tough questions - Part1. RFID Journal. Retrieved 10.03.09.
    • (2007) RFID Journal
    • Diorio, C.1
  • 9
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • Elisson, C., & Schneir, B. (2000). Ten risks of PKI: What you're not being told about public key infrastructure. Computer Security Journal, 16, 1-7.
    • (2000) Computer Security Journal , vol.16 , pp. 1-7
    • Elisson, C.1    Schneir, B.2
  • 10
    • 64249134316 scopus 로고    scopus 로고
    • Vulnerability of an RFID authentication protocol conforming to EPC class 1 generation 2 standards
    • Han, D., & Kwon, D. (2009). Vulnerability of an RFID authentication protocol conforming to EPC class 1 generation 2 standards. Computer Standards and Interfaces, 31(4), 648-652.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.4 , pp. 648-652
    • Han, D.1    Kwon, D.2
  • 11
    • 85030591476 scopus 로고    scopus 로고
    • Authentication and security
    • Retrieved 10.03.09
    • Jamali, B. (2007). Authentication and security. RFID Journal. Retrieved 10.03.09.
    • (2007) RFID Journal
    • Jamali, B.1
  • 13
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID mutual authentication scheme in pervasive computing environment
    • Kang, S. Y., Lee, D. G., & Lee, I. Y. (2008). A study on secure RFID mutual authentication scheme in pervasive computing environment. Computer Communications, 31(18), 4248-4254.
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4248-4254
    • Kang, S.Y.1    Lee, D.G.2    Lee, I.Y.3
  • 17
    • 67349172650 scopus 로고    scopus 로고
    • Integrating RFID with quality assurance system - Framework and applications
    • Available online 6 March 2009
    • Lyu, J., Chang, S. Y. & Chen, T. L. (2009). Integrating RFID with quality assurance system - Framework and applications. Expert Systems with Applications, Available online 6 March 2009.
    • (2009) Expert Systems with Applications
    • Lyu, J.1    Chang, S.Y.2    Chen, T.L.3
  • 18
    • 77957847062 scopus 로고    scopus 로고
    • Gen 2 EPC protocol approved as ISO 18000-6C
    • Retrieved 10.03.09
    • O'Connor, M. C. (2006). Gen 2 EPC protocol approved as ISO 18000-6C. RFID Journal. Retrieved 10.03.09.
    • (2006) RFID Journal
    • O'Connor, M.C.1
  • 22
    • 50049092392 scopus 로고    scopus 로고
    • Wal-Mart to expand RFID tagging requirement
    • Retrieved 10.03.09
    • Roberti, M. (2005). Wal-Mart to expand RFID tagging requirement. RFID Journal. Retrieved 10.03.09.
    • (2005) RFID Journal
    • Roberti, M.1
  • 23
    • 77957838316 scopus 로고    scopus 로고
    • EPCglobal ratifies Gen 2 standard
    • Retrieved 10.03.09
    • Roberti, M. (2007). EPCglobal ratifies Gen 2 standard. RFID Journal. Retrieved 10.03.09.
    • (2007) RFID Journal
    • Roberti, M.1
  • 25
    • 56949107218 scopus 로고    scopus 로고
    • Security co-existence of wireless sensor networks and RFID for pervasive computing
    • Sun, B., Xiao, Y., Li, C. C., Chen, H. H., & Yang, T. A. (2008). Security co-existence of wireless sensor networks and RFID for pervasive computing. Computer Communications, 31(18), 4294-4303.
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4294-4303
    • Sun, B.1    Xiao, Y.2    Li, C.C.3    Chen, H.H.4    Yang, T.A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.