메뉴 건너뛰기




Volumn 6480, Issue PART 2, 2010, Pages 39-63

Impossibility results for RFID privacy notions

Author keywords

Authentication; Privacy; Resettability; RFID; Security

Indexed keywords

FORMAL DEFINITION; IMPOSSIBILITY RESULTS; MUTUAL AUTHENTICATION; PRIVACY; PRIVACY MODELS; PRIVACY RISKS; REAL-LIFE APPLICATIONS; REAL-WORLD; RESETTABILITY; RF-ID TAGS; RFID; RFID SECURITY; RFID SYSTEMS; SECURITY; SECURITY AND PRIVACY;

EID: 78650590814     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17697-5_3     Document Type: Article
Times cited : (19)

References (38)
  • 1
    • 78650151843 scopus 로고    scopus 로고
    • On RFID privacy with mutual authentication and tag corruption
    • Zhou, J. (ed.) ACNS 2010 Springer, Heidelberg
    • Armknecht, F., Sadeghi, A.R., Visconti, I., Wachsmann, C.: On RFID privacy with mutual authentication and tag corruption. In: Zhou, J. (ed.) ACNS 2010. LNCS, vol. 6123, pp. 493-510. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6123 , pp. 493-510
    • Armknecht, F.1    Sadeghi, A.R.2    Visconti, I.3    Wachsmann, C.4
  • 2
    • 70349117963 scopus 로고    scopus 로고
    • Atmel Corporation: Innovative IDIC solutions (2007), http://www.atmel. com/dyn/resources/prod-documents/doc4602.pdf
    • (2007) Innovative IDIC Solutions
  • 3
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial model for radio frequency identification. ePrint
    • Avoine, G.: Adversarial model for radio frequency identification. ePrint, Report 2005/049 (2005)
    • (2005) Report 2005/049
    • Avoine, G.1
  • 5
    • 84945138489 scopus 로고    scopus 로고
    • Identification protocols secure against reset attacks
    • Pfitzmann, B. (ed.) EUROCRYPT 2001 Springer, Heidelberg
    • Bellare, M., Fischlin, M., Goldwasser, S., Micali, S.: Identification protocols secure against reset attacks. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 495-511. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 495-511
    • Bellare, M.1    Fischlin, M.2    Goldwasser, S.3    Micali, S.4
  • 6
    • 57049171408 scopus 로고    scopus 로고
    • Improved security notions and protocols for non-transferable identification
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008 Springer, Heidelberg
    • Blundo, C., Persiano, G., Sadeghi, A.R., Visconti, I.: Improved security notions and protocols for non-transferable identification. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 364-378. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 364-378
    • Blundo, C.1    Persiano, G.2    Sadeghi, A.R.3    Visconti, I.4
  • 7
    • 76749128991 scopus 로고    scopus 로고
    • Efficient zero-knowledge identification schemes which respect privacy
    • ACM Press, New York
    • Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS 2009, pp. 195-205. ACM Press, New York (2009)
    • (2009) Proceedings of ASIACCS 2009 , pp. 195-205
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 8
    • 34748848124 scopus 로고    scopus 로고
    • Universally composable and forward-secure RFID authentication and authenticated key exchange
    • ACM Press, New York
    • Burmester, M., van Le, T., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proc. of ASIACCS, pp. 242-252. ACM Press, New York (2007)
    • (2007) Proc. of ASIACCS , pp. 242-252
    • Burmester, M.1    Van Le, T.2    De Medeiros, B.3
  • 9
    • 0033723965 scopus 로고    scopus 로고
    • Resettable zero-knowledge (extended abstract)
    • Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zero-knowledge (extended abstract). In: STOC, pp. 235-244 (2000)
    • (2000) STOC , pp. 235-244
    • Canetti, R.1    Goldreich, O.2    Goldwasser, S.3    Micali, S.4
  • 10
    • 77049116572 scopus 로고    scopus 로고
    • Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
    • Dolev, S. (ed.) ALGOSENSORS 2009 Springer, Heidelberg
    • D'Arco, P., Scafuro, A., Visconti, I.: Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. In: Dolev, S. (ed.) ALGOSENSORS 2009. LNCS, vol. 5804, pp. 76-87. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5804 , pp. 76-87
    • D'Arco, P.1    Scafuro, A.2    Visconti, I.3
  • 13
    • 38049110283 scopus 로고    scopus 로고
    • Instance-dependent verifiable random functions and their application to simultaneous resettability
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Deng, Y., Lin, D.: Instance-dependent verifiable random functions and their application to simultaneous resettability. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 148-168. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 148-168
    • Deng, Y.1    Lin, D.2
  • 14
    • 78650611667 scopus 로고    scopus 로고
    • (April 2008)
    • EPCglobal Inc.: (April 2008), http://www.epcglobalinc.org/
  • 17
    • 67650699638 scopus 로고    scopus 로고
    • Resettably secure computation
    • Goyal, V., Sahai, A.: Resettably secure computation. In: EUROCRYPT, pp. 54-71 (2009)
    • (2009) EUROCRYPT , pp. 54-71
    • Goyal, V.1    Sahai, A.2
  • 18
    • 51049096802 scopus 로고    scopus 로고
    • RFID and its vulnerability to faults
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008 Springer, Heidelberg
    • Hutter, M., Schmidt, J.M., Plos, T.: RFID and its vulnerability to faults. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 363-379. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 363-379
    • Hutter, M.1    Schmidt, J.M.2    Plos, T.3
  • 20
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication 24(2), 381-395 (2006)
    • (2006) Journal of Selected Areas in Communication , vol.24 , Issue.2 , pp. 381-395
    • Juels, A.1
  • 21
    • 34748832806 scopus 로고    scopus 로고
    • Defining strong privacy for RFID. ePrint
    • Juels, A., Weis, S.A.: Defining strong privacy for RFID. ePrint, Report 2006/137 (2006)
    • (2006) Report 2006/137
    • Juels, A.1    Weis, S.A.2
  • 25
    • 70350383766 scopus 로고    scopus 로고
    • New privacy results on synchronized RFID authentication protocols against tag tracing
    • Backes, M., Ning, P. (eds.) ESORICS 2009 Springer, Heidelberg
    • Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New privacy results on synchronized RFID authentication protocols against tag tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 321-336. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 321-336
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 26
    • 57049184162 scopus 로고    scopus 로고
    • RFID privacy models revisited
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008 Springer, Heidelberg
    • Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-256. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 251-256
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 27
    • 78650161596 scopus 로고    scopus 로고
    • Readers behaving badly: Reader revocation in PKI-based RFID systems
    • Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. ePrint, Report 2009/465 (2009)
    • (2009) EPrint, Report 2009/465
    • Nithyanand, R.1    Tsudik, G.2    Uzun, E.3
  • 28
    • 78650604500 scopus 로고    scopus 로고
    • May
    • NXP Semiconductors: MIFARE (May 2007), http://mifare.net/
    • (2007) NXP Semiconductors
  • 29
    • 78650619211 scopus 로고    scopus 로고
    • NXP Semiconductors April
    • NXP Semiconductors: MIFARE smartcard ICs (April 2010), http://www.mifare.net/products/smartcardics/
    • (2010) MIFARE Smartcard ICs
  • 30
    • 70349118926 scopus 로고    scopus 로고
    • Mutual authentication in RFID: Security and privacy
    • ACM Press, New York
    • Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: Proc. of ASIACCS, pp. 292-299. ACM Press, New York (2008)
    • (2008) Proc. of ASIACCS , pp. 292-299
    • Paise, R.I.1    Vaudenay, S.2
  • 32
    • 71549125572 scopus 로고    scopus 로고
    • Anonymizer-enabled security and privacy for RFID
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009 Springer, Heidelberg
    • Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 134-153. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 134-153
    • Sadeghi, A.R.1    Visconti, I.2    Wachsmann, C.3
  • 34
    • 70349088651 scopus 로고    scopus 로고
    • Location privacy in RFID applications
    • Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location- Based Applications Springer, Heidelberg
    • Sadeghi, A.R., Visconti, I.,Wachsmann, C.: Location privacy in RFID applications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location- Based Applications. LNCS, vol. 5599, pp. 127-150. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5599 , pp. 127-150
    • Sadeghi, A.R.1    Visconti, I.2    Wachsmann, C.3
  • 37
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Kurosawa, K. (ed.) ASIACRYPT 2007 Springer, Heidelberg
    • Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 38
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 50-59. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802 , pp. 50-59
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.