메뉴 건너뛰기




Volumn 6035 LNCS, Issue , 2010, Pages 194-208

Modeling privacy for off-line RFID systems

Author keywords

[No Author keywords available]

Indexed keywords

BACK OFFICE; BEFORE AND AFTER; LARGE-SCALE DEPLOYMENT; PUBLIC TRANSPORT; RANDOM ORACLE MODEL; RFID SYSTEMS; RFID TECHNOLOGY; SECURITY AND PRIVACY; TICKETING SYSTEMS; TIME SLOTS; FORWARD-AND-BACKWARD; SUPPLY CHAIN MANAGEMENT SYSTEM;

EID: 78650146719     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12510-2_14     Document Type: Conference Paper
Times cited : (18)

References (10)
  • 1
    • 76749106728 scopus 로고    scopus 로고
    • When Compromised Readers Meet RFID
    • Youm, H.Y., Jang, J. (eds.) WISA 2009. Springer, Heidelberg
    • Avoine, G., Lauradoux, C., Martin, T.: When Compromised Readers Meet RFID. In: Youm, H.Y., Jang, J. (eds.) WISA 2009. LNCS, vol. 5932, pp. 36-50. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5932 , pp. 36-50
    • Avoine, G.1    Lauradoux, C.2    Martin, T.3
  • 2
    • 26444478592 scopus 로고    scopus 로고
    • RFID Traceability: A Multilayer Problem
    • S. Patrick, A., Yung, M. (eds.) FC 2005. Springer, Heidelberg
    • Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3570 , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 3
    • 33744939250 scopus 로고    scopus 로고
    • Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland September
    • Avoine, G.: Adversary Model for Radio Frequency Identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)
    • (2005) Adversary Model for Radio Frequency Identification
    • Avoine, G.1
  • 6
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic Approach to "Privacy-Friendly" Tags
    • MIT, Massachusetts
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to "Privacy-Friendly" Tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 7
    • 38149085988 scopus 로고    scopus 로고
    • An efficient authentication protocol for rfid systems resistant to active attacks
    • Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. Springer, Heidelberg
    • Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: An efficient authentication protocol for rfid systems resistant to active attacks. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol. 4809, pp. 781-794. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4809 , pp. 781-794
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 8
    • 50249161524 scopus 로고    scopus 로고
    • SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Shamir, A.: SQUASH - A New MAC With Provable Security Properties for Highly Constrained Devices Such as RFID Tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 144-157. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 144-157
    • Shamir, A.1
  • 10
    • 38149038702 scopus 로고    scopus 로고
    • On Privacy Models for RFID
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.