메뉴 건너뛰기




Volumn , Issue , 2010, Pages 371-376

A dynamic mutual RFID authentication model preventing unauthorized third party access

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS DATA; BUSINESS PARTNERS; COMPETITIVE BUSINESS; DATA EXCHANGE; ENCRYPTION METHODS; MANUFACTURING COST; MUTUAL AUTHENTICATION; ONE-TIME PASSWORDS; OPEN INTERFACE; PRIVACY RISKS; RFID AUTHENTICATION; RFID TECHNOLOGY; THIRD PARTIES; THIRD PARTY ACCESS; TRACKING AND TRACING;

EID: 78650358964     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2010.46     Document Type: Conference Paper
Times cited : (10)

References (37)
  • 1
    • 10244234065 scopus 로고    scopus 로고
    • RFID technologies: Supply-chain applications and implementation issues
    • R. Angeles. RFID Technologies: Supply-Chain Applications and Implementation Issues. IS Management, 22(1):51-65, 2005.
    • (2005) IS Management , vol.22 , Issue.1 , pp. 51-65
    • Angeles, R.1
  • 3
    • 78650387729 scopus 로고    scopus 로고
    • RFID: Technology, systems and applications. German association for information technology
    • H. Birgit. RFID: Technology, Systems and Applications. German Association for Information Technology, Telecommun., and New Media e.V. Whitepaper, 2005.
    • (2005) Telecommun., and New Media E.V. Whitepaper
    • Birgit, H.1
  • 5
    • 78649387866 scopus 로고    scopus 로고
    • Bundesverband Informationswirtschaft, Telekommunikation und neue Medien
    • Bundesverband Informationswirtschaft, Telekommunikation und neue Medien. White Paper RFID Technologie, Systeme und Anwendungen, 2005.
    • (2005) White Paper RFID Technologie, Systeme und Anwendungen
  • 7
    • 77951127151 scopus 로고    scopus 로고
    • An empirical study for protecting passive RFID systems against cloning
    • Washington, DC, USA, IEEE Computer Society
    • M. M. El-Said and I. Woodring. An Empirical Study for Protecting Passive RFID Systems against Cloning. In Proceedings of the 6th Int'l Conf. on Information Technology, pages 558-563, Washington, DC, USA, 2009. IEEE Computer Society.
    • (2009) Proceedings of the 6th Int'l Conf. on Information Technology , pp. 558-563
    • El-Said, M.M.1    Woodring, I.2
  • 8
    • 78650328348 scopus 로고    scopus 로고
    • EPCIS Standard v. 1.0.1
    • EPCGlobal. EPCIS Standard v. 1.0.1. http://www.epcglobalinc.org/ standards/epcis/epcis-1-0-1-standard-20070921.pdf1, 2007.
    • (2007) EPCGlobal
  • 9
    • 78650390009 scopus 로고    scopus 로고
    • Object Naming Service Standard v.1.0.1.
    • EPCGlobal. Object Naming Service Standard v.1.0.1. http://www. epcglobalinc.org/standards/ons/ons-1-0-1-standard-20080529.pdf1, 2008.
    • (2008) EPCGlobal
  • 10
    • 78650390009 scopus 로고    scopus 로고
    • Tag Data Standard v. 1.4.
    • EPCGlobal. Tag Data Standard v. 1.4. http://www.epcglobalinc.org/ standards/tds/tds-1-4-standard-20080611.pdf1, 2008.
    • (2008) EPCGlobal
  • 13
    • 14244253910 scopus 로고    scopus 로고
    • An approach to security and privacy of RFID system for supply chain
    • Washington, DC, USA. IEEE Computer Society
    • X. Gao et al. An Approach to Security and Privacy of RFID System for Supply Chain. In Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE Int'l Conf., pages 164-168, Washington, DC, USA, 2004. IEEE Computer Society.
    • (2004) Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE Int'l Conf. , pp. 164-168
    • Gao, X.1
  • 14
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • S. L. Garfinkel, A. Juels, and R. Pappu. RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy, 3:34-43, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 16
    • 78650407455 scopus 로고    scopus 로고
    • IP Crime Group
    • IP Crime Group. IP Crime Report, 2008.
    • (2008) IP Crime Report
  • 20
    • 35248846439 scopus 로고    scopus 로고
    • POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
    • New York, NY, USA. ACM
    • S. Koralalage et al. POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism. In Proceedings of the ACM Symposium on Applied Computing, pages 270-275, New York, NY, USA, 2007. ACM.
    • (2007) Proceedings of the ACM Symposium on Applied Computing , pp. 270-275
    • Koralalage, S.1
  • 22
    • 34547367358 scopus 로고    scopus 로고
    • The pros and cons of RFID in supply chain management
    • Washington, DC, USA, IEEE Computer Society
    • K. Michael and L. McCathie. The Pros and Cons of RFID in Supply Chain Management. In Proceedings of the Int'l Conf. on Mobile Business, pages 623-629, Washington, DC, USA, 2005. IEEE Computer Society.
    • (2005) Proceedings of the Int'l Conf. on Mobile Business , pp. 623-629
    • Michael, K.1    McCathie, L.2
  • 26
    • 70349087741 scopus 로고    scopus 로고
    • A low-resource Public-Key Identification Scheme for RFID Tags and Sensor Nodes
    • New York, NY, USA, ACM
    • Y. Oren and M. Feldhofer. A low-resource Public-Key Identification Scheme for RFID Tags and Sensor Nodes. In Proceedings of the 2nd ACM Conf. on Wireless Network Security, pages 59-68, New York, NY, USA, 2009. ACM.
    • (2009) Proceedings of the 2nd ACM Conf. on Wireless Network Security , pp. 59-68
    • Oren, Y.1    Feldhofer, M.2
  • 28
    • 73049108376 scopus 로고    scopus 로고
    • A common database approach for OLTP and OLAP using an in-memory column database
    • New York, NY, USA, ACM
    • H. Plattner. A Common Database Approach for OLTP and OLAP using an in-memory Column Database. In Proceedings of the 35th SIGMOD Int'l Conf. on Management of Data, pages 1-2, New York, NY, USA, 2009. ACM.
    • (2009) Proceedings of the 35th SIGMOD Int'l Conf. on Management of Data , pp. 1-2
    • Plattner, H.1
  • 32
    • 77649263434 scopus 로고    scopus 로고
    • Privacy enhancing technologies for RFID - A critical investigation of state of the art research
    • S. Spiekermann and S. Evdokimov. Privacy Enhancing Technologies for RFID - A Critical Investigation of State of the Art Research. In IEEE Privacy and Security, 2009.
    • (2009) IEEE Privacy and Security
    • Spiekermann, S.1    Evdokimov, S.2
  • 34
    • 70350431716 scopus 로고    scopus 로고
    • Privacy and ethical issues in location-based tracking systems
    • Washington, DC, USA. IEEE Computer Society
    • J. L. Wang and M. C. Loui. Privacy and Ethical Issues in Location-Based Tracking Systems. In Proceedings of the IEEE Int'l Symposium on Technology and Society, pages 1-4, Washington, DC, USA, 2009. IEEE Computer Society.
    • (2009) Proceedings of the IEEE Int'l Symposium on Technology and Society , pp. 1-4
    • Wang, J.L.1    Loui, M.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.