메뉴 건너뛰기




Volumn 6422 LNAI, Issue PART 2, 2010, Pages 142-152

AONT encryption based application data management in mobile RFID environment

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION DATA; DATA SECURITY; DATA SHARING; ENCRYPTION SCHEMES; LARGE-SCALE DATABASE; MOBILE COMMUNICATIONS; MOBILE RFID; NEW APPLICATIONS; NEW SERVICES; RFID MIDDLEWARE; RFID READERS; SECRET SHARING ALGORITHM; SECRET SHARING SCHEMES; SECURITY MANAGEMENT; UBIQUITOUS SENSOR NETWORKS; WIRELESS INTERNET SERVICE;

EID: 78649566523     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16732-4_16     Document Type: Conference Paper
Times cited : (51)

References (11)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to Share a Secret. Communication of the ACM 22(11), 612-613 (1979)
    • (1979) Communication of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 2
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • Biham, E. ed., Springer, Heidelberg
    • Rivest, R. L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210-218. Springer, Heidelberg (1997)
    • (1997) FSE 1997. LNCS , vol.1267 , pp. 210-218
    • Rivest, R.L.1
  • 3
    • 56649096110 scopus 로고    scopus 로고
    • A fast (3, n)-threshold secret sharingscheme using exclusive-or operations
    • Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (3, n)-threshold secret sharingscheme using exclusive-or operations. IEICE Trans. Fundamentals E91-A (1), 127-138 (2008)
    • (2008) IEICE Trans. Fundamentals , vol.E91-A , Issue.1 , pp. 127-138
    • Kurihara, J.1    Kiyomoto, S.2    Fukushima, K.3    Tanaka, T.4
  • 6
    • 77958504468 scopus 로고    scopus 로고
    • Strongly non-separable encryption mode for throwing a media away
    • Kuwakado, H., Tanaka, H.: Strongly non-separable encryption mode for throwing a media away. Technical Report of IEICE 103(417), 15-18 (2003)
    • (2003) Technical Report of IEICE , vol.103 , Issue.417 , pp. 15-18
    • Kuwakado, H.1    Tanaka, H.2
  • 7
    • 56649086572 scopus 로고    scopus 로고
    • A new (k, n)-Threshold secret sharing scheme and its extension
    • Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. eds., Springer, Heidelberg
    • Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 455-470. Springer, Heidelberg (2008)
    • (2008) ISC 2008. LNCS , vol.5222 , pp. 455-470
    • Kurihara, J.1    Kiyomoto, S.2    Fukushima, K.3    Tanaka, T.4
  • 8
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo-random number generator
    • Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing 15, 364-383 (1986)
    • (1986) SIAM Journal on Computing , vol.15 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 9
    • 77958482600 scopus 로고    scopus 로고
    • Secure RFID application data management using all-or-nothing transform encryption
    • Li, Y. ed., Springer, Heidelberg
    • Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Li, Y. (ed.) WASA 2010. LNCS, vol. 6221, pp. 245-252. Springer, Heidelberg (2010)
    • (2010) WASA 2010. LNCS , vol.6221 , pp. 245-252
    • Park, N.1    Song, Y.2
  • 10
    • 33750298289 scopus 로고    scopus 로고
    • Security analysis and implementation leveraging globally networked mobile RFIDs
    • Cuenca, P., Orozco-Barbosa, L. eds., Springer, Heidelberg
    • Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation leveraging Globally Networked Mobile RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494-505. Springer, Heidelberg (2006)
    • (2006) PWC 2006. LNCS , vol.4217 , pp. 494-505
    • Park, N.1    Kim, S.2    Won, D.3    Kim, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.