메뉴 건너뛰기




Volumn 19, Issue 2, 2011, Pages 319-341

Practical RFID ownership transfer scheme

Author keywords

ownership transfer; RFID; security model

Indexed keywords

AFTER-SALES SERVICES; FURTHER DEVELOPMENT; OWNERSHIP TRANSFER; RESEARCH DIRECTIONS; RF-ID TAGS; RFID; SECURITY MODEL; SECURITY PROPERTIES; SECURITY PROTECTION; TRANSFER SCHEME;

EID: 79952965954     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2010-0409     Document Type: Conference Paper
Times cited : (17)

References (16)
  • 2
    • 63149151663 scopus 로고    scopus 로고
    • A simple delegation scheme for RFID systems (SiDeS)
    • Grapevine, TX, USA, March, IEEE
    • S. Fouladgar and H. Afifi, A simple delegation scheme for RFID systems (SiDeS), in: IEEE RFID, Grapevine, TX, USA, March 2007, IEEE.
    • (2007) IEEE RFID
    • Fouladgar, S.1    Afifi, H.2
  • 3
    • 59249097693 scopus 로고    scopus 로고
    • A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
    • S. Fouladgar and H. Afifi, A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags, Journal of Communications 2(6) (2007), 6-13.
    • (2007) Journal of Communications , vol.2 , Issue.6 , pp. 6-13
    • Fouladgar, S.1    Afifi, H.2
  • 4
    • 70349117791 scopus 로고    scopus 로고
    • An efficient delegation and transfer of ownership protocol for RFID tags
    • Vienna, Austria, September, EURASIP
    • S. Fouladgar and H. Afifi, An efficient delegation and transfer of ownership protocol for RFID tags, in: 1st International EURASIP Workshop on RFID Technology, Vienna, Austria, September 2007, EURASIP.
    • (2007) 1st International EURASIP Workshop on RFID Technology
    • Fouladgar, S.1    Afifi, H.2
  • 5
    • 35248846439 scopus 로고    scopus 로고
    • POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
    • DOI 10.1145/1244002.1244069, Proceedings of the 2007 ACM Symposium on Applied Computing
    • K.H.S.S. Koralalage, M.R. Selim, J. Miura, Y. Goto and J. Cheng, POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism, in: ACM Symposium on Applied Computing - SAC, Seoul, Korea, March 2007, ACM Press, pp. 270-275. (Pubitemid 47568298)
    • (2007) Proceedings of the ACM Symposium on Applied Computing , pp. 270-275
    • Koralalage, K.H.S.S.1    Reza, S.M.2    Miura, J.3    Goto, Y.4    Cheng, J.5
  • 6
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • P. Ning, S. Qing and N. Li, eds, Raleigh, NC, USA, December, Lecture Notes in Computer Science, Springer-Verlag
    • C.H. Lim and T. Kwon, Strong and robust RFID authentication enabling perfect ownership transfer, in: 8th International Conference on Information and Communications Security - ICICS, P. Ning, S. Qing and N. Li, eds, Raleigh, NC, USA, December 2006, Lecture Notes in Computer Science, Vol. 4307, Springer-Verlag, pp. 1-20.
    • (2006) 8th International Conference on Information and Communications Security-ICICS , vol.4307 , pp. 1-20
    • Lim, C.H.1    Kwon, T.2
  • 8
    • 34548180384 scopus 로고    scopus 로고
    • A scalable, delegatable, pseudonym protocol enabling ownership transfer of RFID tags
    • Graz, Austria, July, IAIK TU Graz
    • D. Molnar, A. Soppera and D. Wagner, A scalable, delegatable, pseudonym protocol enabling ownership transfer of RFID tags, in: Workshop on RFID and Light-Weight Crypto, Graz, Austria, July 2005, IAIK TU Graz.
    • (2005) Workshop on RFID and Light-Weight Crypto
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 9
    • 57049184162 scopus 로고    scopus 로고
    • RFID privacy models revisited
    • S. Jajodia and J. Lopez, eds, Malaga, Spain, October, Lecture Notes in Computer Science, Springer-Verlag
    • C.Y. Ng, W. Susilo, Y. Mu and R. Safavi-Naini, RFID privacy models revisited, in: 13th European Symposium on Research in Computer Security - ESORICS, S. Jajodia and J. Lopez, eds, Malaga, Spain, October 2008, Lecture Notes in Computer Science, Vol. 5283, Springer-Verlag, pp. 251-266.
    • (2008) 13th European Symposium on Research in Computer Security-ESORICS , vol.5283 , pp. 251-266
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 10
    • 70350383766 scopus 로고    scopus 로고
    • New privacy results on synchronized RFID authentication protocols against tag tracing
    • M. Backes and P. Ning, eds, Saint-Malo, France, September, Lecture Notes in Computer Science, Springer-Verlag
    • C.Y. Ng, W. Susilo, Y. Mu and R. Safavi-Naini, New privacy results on synchronized RFID authentication protocols against tag tracing, in: 14th European Symposium on Research in Computer Security - ESORICS, M. Backes and P. Ning, eds, Saint-Malo, France, September 2009, Lecture Notes in Computer Science, Vol. 5789, Springer-Verlag, pp. 321-336.
    • (2009) 14th European Symposium on Research in Computer Security-ESORICS , vol.5789 , pp. 321-336
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 11
    • 38349066494 scopus 로고    scopus 로고
    • An efficient and secure RFID security method with ownership transfer
    • Y. Wang, Y. Ming Cheung and H. Liu, eds, Guangzhou, China, November, Lecture Notes in Computer Science, Springer-Verlag
    • K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, An efficient and secure RFID security method with ownership transfer, Y. Wang, Y. Ming Cheung and H. Liu, eds, in: Computational Intelligence and Security - CIS, Guangzhou, China, November 2006, Lecture Notes in Computer Science, Vol. 4456, Springer-Verlag, pp. 778-787.
    • (2006) Computational Intelligence and Security-CIS , vol.4456 , pp. 778-787
    • Osaka, K.1    Takagi, T.2    Yamazaki, K.3    Takahashi, O.4
  • 13
    • 78149486773 scopus 로고    scopus 로고
    • RFID tag ownership transfer
    • Budapest, Hungary, July, IAIK TU Graz
    • B. Song, RFID tag ownership transfer, in: 4th Workshop on RFID Security - RFIDSec, Budapest, Hungary, July 2008, IAIK TU Graz.
    • (2008) 4th Workshop on RFID Security-RFIDSec
    • Song, B.1
  • 14
    • 78149483237 scopus 로고    scopus 로고
    • Secure by default: The RFID acceptor tag (RAT)
    • Graz, Austria, July, IAIK TU Graz
    • A. Soppera and T. Burbridge. Secure by default: The RFID acceptor tag (RAT), in: 2nd Workshop on RFID Security - RFIDSec, Graz, Austria, July 2006, IAIK TU Graz.
    • (2006) 2nd Workshop on RFID Security-RFIDSec
    • Soppera, A.1    Burbridge, T.2
  • 15
    • 70350399643 scopus 로고    scopus 로고
    • Secure ownership and ownership transfer in RFID systems
    • Saint-Malo, France, September, Lecture Notes in Computer Science, Springer-Verlag
    • T. van Deursen, S. Mauw, S. Radomirović and P. Vullers, Secure ownership and ownership transfer in RFID systems, in: 14th European Symposium on Research in Computer Security - ESORICS, Saint- Malo, France, September 2009, Lecture Notes in Computer Science, Vol. 5789, Springer-Verlag, pp. 637-654.
    • (2009) 14th European Symposium on Research in Computer Security-ESORICS , vol.5789 , pp. 637-654
    • Van Deursen, T.1    Mauw, S.2    Radomirović, S.3    Vullers, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.