메뉴 건너뛰기




Volumn 48, Issue 1, 2011, Pages 132-149

RFID Authentication Efficient Proactive Information Security within Computational Security

Author keywords

Authentication protocol; Computational security; Information theoretic security; Pseudo random numbers; RFID tags

Indexed keywords

AUTHENTICATION; INFORMATION THEORY;

EID: 78650993939     PISSN: 14324350     EISSN: 14330490     Source Type: Journal    
DOI: 10.1007/s00224-009-9236-0     Document Type: Article
Times cited : (12)

References (18)
  • 2
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Bonen, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897-1905 (1998).
    • (1998) IEEE Trans. Inform. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Bonen, D.1    Shaw, J.2
  • 4
    • 0013001552 scopus 로고    scopus 로고
    • Proactive security: long-term protection against break-ins
    • Canetti, R., Gennaro, R., Herzberg, A., Naor, D.: Proactive security: long-term protection against break-ins. RSA CryptoBytes 1(3), 1-8 (1997).
    • (1997) RSA CryptoBytes , vol.1 , Issue.3 , pp. 1-8
    • Canetti, R.1    Gennaro, R.2    Herzberg, A.3    Naor, D.4
  • 10
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • Lecture Notes in Computer Science, C. Blundo and S. Cimato (Eds.), Berlin: Springer
    • Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) Security in Communication Networks SCN 2004. Lecture Notes in Computer Science, vol. 3352, pp. 149-164. Springer, Berlin (2004).
    • (2004) Security in Communication Networks SCN 2004 , vol.3352 , pp. 149-164
    • Juels, A.1
  • 11
    • 33749028998 scopus 로고    scopus 로고
    • Strengthening EPC tags against cloning
    • Juels, A.: Strengthening EPC tags against cloning. In: ACM Workshop on Wireless Security, pp. 67-76 (2005).
    • (2005) ACM Workshop on Wireless Security , pp. 67-76
    • Juels, A.1
  • 12
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: a research survey
    • Juels, A.: RFID security and privacy: a research survey, IEEE J. Sel. Areas Commun. 24(2) (2006).
    • (2006) IEEE J. Sel. Areas Commun , vol.24 , Issue.2
    • Juels, A.1
  • 15
    • 2942556410 scopus 로고    scopus 로고
    • Radio-frequency identification: security risks and challenges
    • Sarma, S. E., Weis, S. A., Engels, D. W.: Radio-frequency identification: security risks and challenges. RSA CryptoBytes 6(1) (2003).
    • (2003) RSA CryptoBytes , vol.6 , Issue.1
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 18
    • 33744911390 scopus 로고    scopus 로고
    • On bluetooth repairing: key agreement based on symmetric key cryptography
    • Beijing, China
    • Vaudenay, S.: On bluetooth repairing: key agreement based on symmetric key cryptography. In: Proceedings of Conference on Information Security and Cryptology, pp. 1-9, Beijing, China (2005).
    • (2005) Proceedings of Conference on Information Security and Cryptology , pp. 1-9
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.