메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Privacy enhanced RFID using quasi-dyadic fix domain shrinking

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY; RADIO FREQUENCY IDENTIFICATION (RFID); RADIO SYSTEMS;

EID: 79551626469     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2010.5684216     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 4
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Ari Juels, "RFID security and privacy: a research survey," IEEE Journal on Selected Areas in Communications, vol. 24, no.2, pp.381-394, 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 5
    • 0021409284 scopus 로고
    • Probabilistic Encryption
    • S. Goldwasser and S. Micali, "Probabilistic Encryption", J. Comput. Syst. Sci. vol. 28, no.2, pp.270-299, 1984.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 6
    • 0022582790 scopus 로고
    • Knapsack-type Cryptosystems and Algebraic Coding Theory
    • H. Niederreiter, "Knapsack-type Cryptosystems and Algebraic Coding Theory," Problems of Control and Information Theory, vol. 15, no. 2, pp. 159-166, 1986.
    • (1986) Problems of Control and Information Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 8
    • 70549109066 scopus 로고    scopus 로고
    • Compact McEliece Keys from Goppa Codes
    • Selected Areas in Cryptography 2009 (SAC 2009)
    • R. Misoczki and P. S. L. M. Barreto,"Compact McEliece Keys from Goppa Codes," Selected Areas in Cryptography 2009 (SAC 2009), LNCS, pp.376-392, 2009.
    • (2009) LNCS , pp. 376-392
    • Misoczki, R.1    Barreto, P.S.L.M.2
  • 10
    • 0037265447 scopus 로고    scopus 로고
    • Hardness of approximating the minimum distance of a linear code
    • M. Sudan, I. Dumer, and D. Micciancio, "Hardness of approximating the minimum distance of a linear code," IEEE Trans. Inf. Theory, vol. 49, no. 1, pp. 22-37, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.1 , pp. 22-37
    • Sudan, M.1    Dumer, I.2    Micciancio, D.3
  • 11
    • 34547653526 scopus 로고    scopus 로고
    • Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
    • Y. Cui, K. Kobara, K. Matsuura and H. Imai,"Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way," PerCom Workshops (PerSec) 2007, pp.223-228, 2007.
    • (2007) PerCom Workshops (PerSec) 2007 , pp. 223-228
    • Cui, Y.1    Kobara, K.2    Matsuura, K.3    Imai, H.4
  • 12
    • 72449174805 scopus 로고    scopus 로고
    • Security Bounds for the Design of Code-based Cryptosystems
    • M. Finiasz and N. Sendrier,"Security Bounds for the Design of Code-based Cryptosystems", ASIACRYPT2009, pp.88-105, 2009.
    • (2009) ASIACRYPT2009 , pp. 88-105
    • Finiasz, M.1    Sendrier, N.2
  • 13
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • ASI-ACRYPT2001
    • N. J. Hopper, M. Blum,"Secure Human Identification Protocols", ASI-ACRYPT2001, LNCS, pp.52-66, 2001.
    • (2001) LNCS , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 14
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • Proc, of CRYPTO 2005
    • A. Juels, S. A. Weis,"Authenticating Pervasive Devices with Human Protocols" Proc, of CRYPTO 2005, LNCS, pp.293-308, 2005.
    • (2005) LNCS , pp. 293-308
    • Juels, A.1    Weis, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.