메뉴 건너뛰기




Volumn , Issue , 2010, Pages 3267-3270

Research on the security issues of RFID-based supply chain

Author keywords

RFID; Security; Supply chain

Indexed keywords

BACK-END DATABASE; DATA TRANSMISSION; EAVESDROPPING ATTACKS; KEYPOINTS; RF-ID TAGS; RFID; RFID SYSTEMS; SECURITY; SECURITY ISSUES; WIRELESS CHANNEL; WIRELESS COMMUNICATION SYSTEM;

EID: 78649658954     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEE.2010.822     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 33745597876 scopus 로고    scopus 로고
    • A Scalable, Delegatable Pseudonym Protocol. Enabling Ownership Transfer of RFID Tags
    • D. Molnar, A. Soppera, and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol. Enabling Ownership Transfer of RFID Tags", Selected Areas in Cryptography, 2005, pp. 276-290.
    • (2005) Selected Areas in Cryptography , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 2
    • 84977783611 scopus 로고    scopus 로고
    • Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
    • ICICS 2006
    • C. H. Lim, T. Kwon , "Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer", In ICICS 2006, volume 4307 of LNCS, pp. 1-20.
    • LNCS , vol.4307 , pp. 1-20
    • Lim, C.H.1    Kwon, T.2
  • 3
    • 35048904109 scopus 로고    scopus 로고
    • Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
    • EUC 2004
    • J. Saito, J. C. Ryou, and K. Sakurai, "Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags", In EUC 2004, volume 3207 of LNCS, pp. 879-890.
    • LNCS , vol.3207 , pp. 879-890
    • Saito, J.1    Ryou, J.C.2    Sakurai, K.3
  • 4
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response Based RFID Authentication Protocol for Distributed Database Environment
    • SPC 2005
    • K. Rhee, J. Kwak, and S. Kim, et al, "Challenge-response Based RFID Authentication Protocol for Distributed Database Environment", In SPC 2005, volume 3450 of LNCS, pp. 70-84.
    • LNCS , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3
  • 8
    • 33745926180 scopus 로고    scopus 로고
    • New Security Problem in RFID Systems 'Tag Killing'
    • ACIS 2006
    • D. G. Han, T. Takagi, and H. W. Kim, et al, "New Security Problem in RFID Systems 'Tag Killing'", In ACIS 2006, volume 3982 of LNCS, pp. 375-384.
    • LNCS , vol.3982 , pp. 375-384
    • Han, D.G.1    Takagi, T.2    Kim, H.W.3
  • 10
    • 57049150751 scopus 로고    scopus 로고
    • A Study on Secure RFID Mutual Authentication Scheme in Pervasive
    • doi:10.1016/j.comcom.2008.05.006
    • Soo-Young Kang, Deok-Gyu Lee, and Im-Yeong Lee "A Study on Secure RFID Mutual Authentication Scheme in Pervasive", Comput. Com mun., 2008, doi:10.1016/j.comcom.2008.05.006.
    • (2008) Comput. Com Mun.
    • Kang, S.-Y.1    Lee, D.-G.2    Lee, I.-Y.3
  • 11
    • 38949212887 scopus 로고    scopus 로고
    • Owner transferable privacy protection scheme for RFID tags
    • CSS 2005
    • J. Saito, K. Sakurai, "Owner transferable privacy protection scheme for RFID tags", In CSS 2005, volume 2005 of IPSJ Symposium Series, pp.283-288.
    • IPSJ Symposium Series , vol.2005 , pp. 283-288
    • Saito, J.1    Sakurai, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.