메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 250-256

The design of RFID access control protocol using the strategy of indefinite-index and challenge-response

Author keywords

Access control; Authentication; Authorization; RFID; Security

Indexed keywords

ACCESS CONTROL PROTOCOL; ACCESS CONTROL SCHEMES; ACCESS RIGHTS; AUTHENTICATION MECHANISMS; AUTHORIZATION; CHALLENGE RESPONSE; LOCATION PRIVACY; MAN IN THE MIDDLE ATTACKS; MUTUAL AUTHENTICATION; RFID; RFID SYSTEMS; SECURITY;

EID: 78751647681     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.05.012     Document Type: Article
Times cited : (25)

References (8)
  • 1
    • 33646943487 scopus 로고    scopus 로고
    • Security and privacy in RFID and applications in telemedicine
    • Y. Xiao, X. Shen, B. Sun, and L. Cai Security and privacy in RFID and applications in telemedicine IEEE Communication Magazine 44 4 2006 64 72
    • (2006) IEEE Communication Magazine , vol.44 , Issue.4 , pp. 64-72
    • Xiao, Y.1    Shen, X.2    Sun, B.3    Cai, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.