메뉴 건너뛰기




Volumn 6123 LNCS, Issue , 2010, Pages 493-510

On RFID privacy with mutual authentication and tag corruption

Author keywords

Mutual authentication; Privacy; RFID; Security model

Indexed keywords

FORMAL DEFINITION; MUTUAL AUTHENTICATION; PRIVACY; PRIVACY MODELS; PRIVACY RISKS; PROTOCOL EXECUTION; REAL-LIFE APPLICATIONS; RF-ID TAGS; RFID; RFID SECURITY; RFID SYSTEMS; SECURITY AND PRIVACY; SECURITY MODEL;

EID: 78650151843     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13708-2_29     Document Type: Conference Paper
Times cited : (17)

References (31)
  • 1
    • 70349117963 scopus 로고    scopus 로고
    • Atmel Corporation: Innovative IDIC solutions (2007), http://www.atmel. com/dyn/resources/prod-documents/doc4602.pdf
    • (2007) Innovative IDIC Solutions
  • 2
    • 71549116235 scopus 로고    scopus 로고
    • NXP Semiconductors (September)
    • NXP Semiconductors: MIFARE smartcard ICs (September 2008), http://www.mifare.net/products/smartcardics/
    • (2008) MIFARE Smartcard ICs
  • 5
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 50-59. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802 , pp. 50-59
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 6
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication 24(2), 381-395 (2006)
    • (2006) Journal of Selected Areas in Communication , vol.24 , Issue.2 , pp. 381-395
    • Juels, A.1
  • 7
    • 70349088651 scopus 로고    scopus 로고
    • Location privacy in RFID applications
    • Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. Springer, Heidelberg
    • Sadeghi, A.R., Visconti, I.,Wachsmann, C.: Location privacy in RFID applications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 127-150. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5599 , pp. 127-150
    • Sadeghi, A.R.1    Visconti, I.2    Wachsmann, C.3
  • 11
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 12
    • 70349118926 scopus 로고    scopus 로고
    • Mutual authentication in RFID: Security and privacy
    • ACM Press, New York
    • Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: Proc. of ASIACCS, pp. 292-299. ACM Press, New York (2008)
    • (2008) Proc. of ASIACCS , pp. 292-299
    • Paise, R.I.1    Vaudenay, S.2
  • 15
    • 51049096802 scopus 로고    scopus 로고
    • RFID and its vulnerability to faults
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
    • Hutter, M., Schmidt, J.M., Plos, T.: RFID and its vulnerability to faults. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 363-379. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 363-379
    • Hutter, M.1    Schmidt, J.M.2    Plos, T.3
  • 16
    • 79958073961 scopus 로고    scopus 로고
    • New methods for cost-effective side-channel attacks on cryptographic RFIDs
    • Kasper, T., Oswald, D., Paar, C.: New methods for cost-effective side-channel attacks on cryptographic RFIDs. In: Workshop on RFID Security, RFIDSec (2009)
    • (2009) Workshop on RFID Security, RFIDSec
    • Kasper, T.1    Oswald, D.2    Paar, C.3
  • 18
    • 77049116572 scopus 로고    scopus 로고
    • Revisiting DoS attacks and privacy in RFIDenabled networks
    • Dolev, S. (ed.) ALGOSENSORS 2009. Springer, Heidelberg
    • D'Arco, P., Scafuro, A., Visconti, I.: Revisiting DoS Attacks and Privacy in RFIDEnabled Networks. In: Dolev, S. (ed.) ALGOSENSORS 2009. LNCS, vol. 5804, pp. 76-87. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5804 , pp. 76-87
    • D'arco, P.1    Scafuro, A.2    Visconti, I.3
  • 19
    • 57049184162 scopus 로고    scopus 로고
    • RFID privacy models revisited
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-266. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 251-266
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 20
    • 70350383766 scopus 로고    scopus 로고
    • New privacy results on synchronized RFID authentication protocols against tag tracing
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New privacy results on synchronized RFID authentication protocols against tag tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 321-336. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 321-336
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 21
    • 76749128991 scopus 로고    scopus 로고
    • Efficient zero-knowledge identification schemes which respect privacy
    • ACM Press, New York
    • Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS '09, pp. 195-205. ACM Press, New York (2009)
    • (2009) Proceedings of ASIACCS '09 , pp. 195-205
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 23
    • 71549125572 scopus 로고    scopus 로고
    • Anonymizer-enabled security and privacy for RFID
    • Miyaji, A., Echizen, I., Okamoto, T. (eds.) CANS 2009. Springer, Heidelberg
    • Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: Miyaji, A., Echizen, I., Okamoto, T. (eds.) CANS 2009. LNCS, vol. 5888, pp. 134-153. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 134-153
    • Sadeghi, A.R.1    Visconti, I.2    Wachsmann, C.3
  • 25
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof-Systems. SIAM J. on Computing 18(6), 186-208 (1989)
    • (1989) SIAM J. on Computing , vol.18 , Issue.6 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.