메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 833-845

Flaws on RFID grouping-proofs. Guidelines for future sound protocols

Author keywords

Cryptanalysis; Grouping proof; Privacy; RFID; Security

Indexed keywords

CRYPTANALYSIS; GROUPING-PROOF; PRIVACY; RFID; SECURITY;

EID: 79952440282     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.04.008     Document Type: Article
Times cited : (81)

References (27)
  • 1
    • 79952449832 scopus 로고    scopus 로고
    • 18006-C ISO/IEC. Information technology - radio frequency identification for item management - part 6: parameters for air interface communications at 860 MHz to 960 MHz, 2005
    • 18006-C ISO/IEC. Information technology radio frequency identification for item management part 6: parameters for air interface communications at 860 MHz to 960 MHz, 2005 〈 http://www.iso.org 〉.
  • 5
    • 52949116082 scopus 로고    scopus 로고
    • Provably secure grouping-proofs for RFID Tags. In: Proceeding of the 8th smart card research and advanced applications - CARDIS 2008
    • UK: Springer, Royal Holloway University of London; September
    • Burmester M, de Medeiros B, Motta R. Provably secure grouping-proofs for RFID Tags. In: Proceeding of the 8th smart card research and advanced applications CARDIS 2008. Lecture notes in computer science. UK: Springer, Royal Holloway University of London; September 2008.
    • (2008) Lecture Notes in Computer Science
    • Burmester, M.1    De Medeiros, B.2    Motta, R.3
  • 6
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • DOI 10.1109/TDSC.2007.70226
    • H.-Y. Chien SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340 (Pubitemid 350125898)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 8
    • 78650269814 scopus 로고    scopus 로고
    • Two RFID-based solutions to enhance inpatient medication safety
    • Chien H-Y, Yang C-C, Wu T-C, Lee C-F. Two RFID-based solutions to enhance inpatient medication safety. Journal of Medical Systems 2010. 〈 http://www.springerlink.com/content/x2n7x062637g6k74/ 〉
    • (2010) Journal of Medical Systems
    • Chien, H.-Y.1    Yang, C.-C.2    Wu, T.-C.3    Lee, C.-F.4
  • 11
    • 79952440443 scopus 로고    scopus 로고
    • Generation-2 EPCGlobal, 2008. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.2.0: "Gen-2"
    • Generation-2 EPCGlobal, 2008. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.2.0: "Gen-2" 〈 http://www. epcglobalinc.org/standards/ 〉.
  • 12
    • 64249134316 scopus 로고    scopus 로고
    • Vulnerability of an rfid authentication protocol conforming to epc class 1 generation 2 standards
    • D. Han, and D. Kwon Vulnerability of an rfid authentication protocol conforming to epc class 1 generation 2 standards Computer Standards & Interfaces 31 4 2009 648 652
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 648-652
    • Han, D.1    Kwon, D.2
  • 13
    • 70350247648 scopus 로고    scopus 로고
    • A RFID grouping proof protocol for medication safety of inpatient
    • H.-H. Huang, and C.-Y. Ku A RFID grouping proof protocol for medication safety of inpatient Journal of Medical Systems 33 6 2009 467 474
    • (2009) Journal of Medical Systems , vol.33 , Issue.6 , pp. 467-474
    • Huang, H.-H.1    Ku, C.-Y.2
  • 15
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels RFID security and privacy: a research survey IEEE Journal on Selected Areas in Communications 24 2 2006 381 394 (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 16
    • 26444603942 scopus 로고    scopus 로고
    • New applications of T-functions in block ciphers and hash functions
    • Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
    • Klimov A, Shamir A. New applications of t-functions in block ciphers and hash functions. In: Proceedings of 12th international workshop, fast software encryption. Lecture notes in computer science, vol. 3557. ENSTA, Paris, France, Springer: 2005; p. 1831. (Pubitemid 41425153)
    • (2005) Lecture Notes in Computer Science , vol.3557 , pp. 18-31
    • Klimov, A.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.