메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 337-341

Improvement of the RFID authentication scheme based on quadratic residues

Author keywords

Authentication; Privacy; RFID; Security

Indexed keywords

AUTOMATIC IDENTIFICATION; ELECTRONIC TAGS; IMPERSONATION ATTACK; IMPROVED SCHEME; LOCATION PRIVACY; PRIVACY; QUADRATIC RESIDUES; REPLAY ATTACK; RFID; RFID AUTHENTICATION; SECURITY; SECURITY AND PRIVACY;

EID: 78751649779     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.05.011     Document Type: Article
Times cited : (69)

References (16)
  • 1
    • 78751643657 scopus 로고    scopus 로고
    • Available from
    • AIM web site. Available from: < http://www.aimglobal.org/ >.
    • AIM Web Site
  • 2
    • 67349277179 scopus 로고    scopus 로고
    • PAP: A privacy and authentication protocol for passive RFID tags
    • A.X. Liu, and L.A. Bailey PAP: a privacy and authentication protocol for passive RFID tags Computer Communications 32 7-10 2009 1194 1199
    • (2009) Computer Communications , vol.32 , Issue.710 , pp. 1194-1199
    • Liu, A.X.1    Bailey, L.A.2
  • 4
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual-authentication scheme based on quadratic residues for RFID systems
    • Y. Chen, J.S. Chou, and H.M. Sun A novel mutual-authentication scheme based on quadratic residues for RFID systems Computer Networks 52 12 2008 2373 2380
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1    Chou, J.S.2    Sun, H.M.3
  • 5
    • 33751546328 scopus 로고    scopus 로고
    • Mutual-authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • H.Y. Chien, and C.H. Chen Mutual-authentication protocol for RFID conforming to EPC class 1 generation 2 standards Computer Standards & Interfaces 29 2 2007 254 259
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 6
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID mutual-authentication scheme in pervasive computing environment
    • S.Y. Kang, D.G. Lee, and I.Y. Lee A study on secure RFID mutual-authentication scheme in pervasive computing environment Computer Communications 31 18 2008 4248 4254
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4248-4254
    • Kang, S.Y.1    Lee, D.G.2    Lee, I.Y.3
  • 7
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification (RFID)
    • C.M. Roberts Radio frequency identification (RFID) Computers & Security 25 1 2006 18 26
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 18-26
    • Roberts, C.M.1
  • 8
    • 42549157259 scopus 로고    scopus 로고
    • A framework for assessing RFID system security and privacy risks
    • P. Rotter A framework for assessing RFID system security and privacy risks Pervasive Computing IEEE 7 2 2008 70 77
    • (2008) Pervasive Computing IEEE , vol.7 , Issue.2 , pp. 70-77
    • Rotter, P.1
  • 9
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • A. Juels Minimalist cryptography for low-cost RFID tags LNCS 3352 2004 149 164
    • (2004) LNCS , vol.3352 , pp. 149-164
    • Juels, A.1
  • 10
    • 64249137046 scopus 로고    scopus 로고
    • A hybrid approach for privacy-preserving RFID tags
    • E.K. Ryu, and T. Takagi A hybrid approach for privacy-preserving RFID tags Computer Standards & Interfaces 31 4 2009 812 815
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 812-815
    • Ryu, E.K.1    Takagi, T.2
  • 13
    • 38149000154 scopus 로고    scopus 로고
    • An efficient mutual-authentication scheme for EPCglobal class-1 generation-2 RFID system
    • N.W. Lo, and K.H. Yeh An efficient mutual-authentication scheme for EPCglobal class-1 generation-2 RFID system LNCS 4809 2007 43 56
    • (2007) LNCS , vol.4809 , pp. 43-56
    • Lo, N.W.1    Yeh, K.H.2
  • 14
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • H.Y. Chien SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 2007 337 340
    • (2007) IEEE Transactions on Dependable and Secure Computing , Issue.4 , pp. 337-340
    • Chien, H.Y.1
  • 15
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC class 1 generation 2 standards RFID system with mutual-authentication and privacy protection
    • C.L. Chen, and Y.Y. Deng Conformation of EPC class 1 generation 2 standards RFID system with mutual-authentication and privacy protection Engineering Applications of Artificial Intelligence 22 8 2009 1284 1291
    • (2009) Engineering Applications of Artificial Intelligence , vol.22 , Issue.8 , pp. 1284-1291
    • Chen, C.L.1    Deng, Y.Y.2
  • 16
    • 77949562527 scopus 로고    scopus 로고
    • Cryptanalysis of some RFID authentication protocols
    • T. Cao, and P. Shen Cryptanalysis of some RFID authentication protocols Journal of Communications 3 7 2008 20 27
    • (2008) Journal of Communications , vol.3 , Issue.7 , pp. 20-27
    • Cao, T.1    Shen, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.