메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 853-863

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems

Author keywords

Information confinement; Privacy; Probabilistic algorithm; RFID systems; Security

Indexed keywords

INFORMATION CONFINEMENT; PRIVACY; PROBABILISTIC ALGORITHM; RFID SYSTEMS; SECURITY;

EID: 79952451735     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.04.015     Document Type: Article
Times cited : (20)

References (35)
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti Universally composable security: a new paradigm for cryptographic protocols FOCS '01: Proceedings of the 42nd IEEE symposium on foundations of computer science, Washington, DC, USA 2001 IEEE Computer Society 136 145 (Pubitemid 33068374)
    • (2001) Annual Symposium on Foundations of Computer Science - Proceedings , pp. 136-145
    • Canetti, R.1
  • 17
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • Advances in Cryptology - ASIACRYPT 2001
    • Hopper NJ, Blum M. Secure human identification protocols. In: Proceedings of the seventh international conference on the theory and application of cryptology and information security (ASIACRYPT '01). Lecture notes in computer science, vol. 2248, Gold Coast, Australia. Springer-Verlag; 2001. p. 5266. (Pubitemid 33371178)
    • (2002) Lecture Notes in Computer Science , Issue.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 18
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels RFID security and privacy: a research survey IEEE Journal on Selected Areas in Communications 24 2 2006 381 394 (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 19
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Santa Barbara, California, USA. Springer-Verlag
    • Juels A, Weis S. Authenticating pervasive devices with human protocols. In: Advances in cryptologyCRYPTO'05. Lecture notes in computer science, vol. 3126, Santa Barbara, California, USA. Springer-Verlag; 2005. p. 293308.
    • (2005) Advances in cryptology-CRYPTO'05. Lecture Notes in Computer Science , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 21
    • 26444603942 scopus 로고    scopus 로고
    • New applications of T-functions in block ciphers and hash functions
    • Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
    • Klimov A, Shamir A. New applications of t-functions in block ciphers and hash functions. In: Gilbert H, Handschuh H, editors. FSE. Lecture notes in computer science, vol. 3557. Paris, France. Springer; 2005. p. 1831. (Pubitemid 41425153)
    • (2005) Lecture Notes in Computer Science , vol.3557 , pp. 18-31
    • Klimov, A.1    Shamir, A.2
  • 24
    • 60549098472 scopus 로고    scopus 로고
    • RFID infrastructure design: A case study of two Australian RFID projects
    • J.P.T. Mo, Q.Z. Sheng, X. Li, and S. Zeadally RFID infrastructure design: a case study of two Australian RFID projects IEEE Internet Computing 13 1 2009 14 21
    • (2009) IEEE Internet Computing , vol.13 , Issue.1 , pp. 14-21
    • Mo, J.P.T.1    Sheng, Q.Z.2    Li, X.3    Zeadally, S.4
  • 25
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • Molnar D, Wagner D. Privacy and security in library RFID: issues, practices, and architectures. In: CCS '04: proceedings of the 11th ACM conference on computer and communications security, New York, NY, USA. ACM Press; 2004. p. 2109. (Pubitemid 40338202)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 26
    • 34547426005 scopus 로고    scopus 로고
    • Cryptanalysis of t-function-based hash functions
    • Rhee MS, Lee B, editors. Busan, Korea. Springer
    • Muller F, Peyrin T. Cryptanalysis of t-function-based hash functions. In: Rhee MS, Lee B, editors. ICISC. Lecture notes in computer science, vol. 4296. Busan, Korea. Springer; 2006. p. 26785.
    • (2006) ICISC. Lecture Notes in Computer Science , vol.4296 , pp. 267-85
    • Muller, F.1    Peyrin, T.2
  • 28
    • 34547638972 scopus 로고    scopus 로고
    • HB and related lightweight authentication protocols for secure RFID tag/reader authentication
    • Basel, Switzerland, June
    • Piramuthu S. HB and related lightweight authentication protocols for secure RFID tag/reader authentication. In: Collaborative electronic commerce technology and researchCollECTeR 2006, Basel, Switzerland, June 2006.
    • (2006) Collaborative Electronic Commerce Technology and Research-CollECTeR 2006
    • Piramuthu, S.1
  • 29
    • 33745866296 scopus 로고    scopus 로고
    • A compact FPGA implementation of the hash function whirlpool
    • Fourteenth ACM/SIGDA International Symposium on Field Programmable Gate Arrays - FPGA 2006
    • N. Pramstaller, C. Rechberger, and V. Rijmen A compact fpga implementation of the hash function whirlpool FPGA '06: Proceedings of the 2006 ACM/SIGDA 14th international symposium on field programmable gate arrays, New York, NY, USA 2006 ACM Press 159 166 (Pubitemid 44032249)
    • (2006) ACM/SIGDA International Symposium on Field Programmable Gate Arrays - FPGA , pp. 159-166
    • Pramstaller, N.1    Rechberger, C.2    Rijmen, V.3
  • 30
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • Rhee K, Kwak J, Kim S, Won D. Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter D, Ullmann M, editors. International conference on security in pervasive computingSPC 2005. Lecture notes in computer science, vol. 3450, Boppard, Germany. Springer-Verlag; 2005. p. 7084. (Pubitemid 41274193)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 31
    • 50249161524 scopus 로고    scopus 로고
    • SQUASH-a new MAC with provable security properties for highly constrained devices such as RFIDs tags
    • Lausanne, Switzerland. Springer
    • Shamir A. SQUASHa new MAC with provable security properties for highly constrained devices such as RFIDs tags. In: The 15th international workshop on fast software encryption (FSE). Lecture notes in computer science, vol. 5086. Lausanne, Switzerland. Springer; 2008. p. 14457.
    • (2008) The 15th International Workshop on Fast Software Encryption (FSE). Lecture Notes in Computer Science , vol.5086 , pp. 144-157
    • Shamir, A.1
  • 32
    • 52449127948 scopus 로고    scopus 로고
    • Enabling next-generation RFID applications: Solutions and challenges
    • Q.Z. Sheng, X. Li, and S. Zeadally Enabling next-generation RFID applications: solutions and challenges Computer 41 9 2008 21 28
    • (2008) Computer , vol.41 , Issue.9 , pp. 21-28
    • Sheng, Q.Z.1    Li, X.2    Zeadally, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.