메뉴 건너뛰기




Volumn 13, Issue 1, 2011, Pages 41-48

RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards

Author keywords

Authentication; Electronic product code (EPC); Ownership transfer; Radio frequency identification (RFID); Security

Indexed keywords

AUTHORIZATION SYSTEMS; AUTOMATIC IDENTIFICATION; ELECTRONIC PRODUCT CODES; EPCGLOBAL; INDUSTRY STANDARDS; MUTUAL AUTHENTICATION; OWNERSHIP TRANSFER; RADIO FREQUENCIES; RFID SYSTEMS; SECURITY; SECURITY PROBLEMS; THIRD PARTIES;

EID: 79953072900     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (34)

References (16)
  • 1
    • 77949553535 scopus 로고    scopus 로고
    • Cryptanalysis of two RFID authentication protocols
    • July
    • T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International Journal of Network Security, vol. 9, no. 1, pp. 95-100, July 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 95-100
    • Cao, T.1    Shen, P.2
  • 2
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed Solutions
    • S. L. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: An overview of problems and proposed Solutions," IEEE Security & Privacy Magazine, vol. 3, no. 3, pp. 34-43, 2005.
    • (2005) IEEE Security & Privacy Magazine , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 3
    • 52949100457 scopus 로고    scopus 로고
    • An efficient localization scheme for a differential-driving mobile robot based on RFID system
    • S. Han, H. Lim, and J. Lee, "An efficient localization scheme for a differential-driving mobile robot based on RFID system,"IEEE Transations on Industrial Electronics, vol. 54, no. 6, pp. 3362-3369, 2007.
    • (2007) IEEE Transations on Industrial Electronics , vol.54 , Issue.6 , pp. 3362-3369
    • Han, S.1    Lim, H.2    Lee, J.3
  • 4
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • Mar
    • A. D. Henrici and P. Maüller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers," Proceedings of PerSec' 04, pp. 149-153, Mar., 2004.
    • (2004) Proceedings of PerSec' 04 , pp. 149-153
    • Henrici, A.D.1    Maüller, P.2
  • 6
    • 80054054775 scopus 로고    scopus 로고
    • (http://www.epcglobalinc.org/)
  • 7
    • 80054067859 scopus 로고    scopus 로고
    • (http://www.epcglobalinc.org/standards/uhfc1g2)
  • 9
    • 35248846439 scopus 로고    scopus 로고
    • An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
    • K. H. S. S. Koralalage, M. R. Selim, J. Miura, Y. Goto, and J. Cheng, "An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism," Proceedings of ACM Symposium on Applied Computing, pp. 270-275, 2007.
    • (2007) Proceedings of ACM Symposium on Applied Computing , pp. 270-275
    • Koralalage, K.H.S.S.1    Selim, M.R.2    Miura, J.3    Goto, Y.4    Cheng, J.5
  • 10
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
    • D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," Selected Areas in Cryptography, pp. 276-290, 2005.
    • (2005) Selected Areas in Cryptography , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 12
    • 35048904109 scopus 로고    scopus 로고
    • Enhancing privacy of universal re-encryption scheme for RFID tags
    • LNCS, 3207
    • J. Saito, J. C. Ryou, and K. Sakurai, "Enhancing privacy of universal re-encryption scheme for RFID tags," Proceedings of EUC'2004, LNCS 3207, pp. 879-890, 2004.
    • (2004) Proceedings of EUC'2004 , pp. 879-890
    • Saito, J.1    Ryou, J.C.2    Sakurai, K.3
  • 16
    • 77958017166 scopus 로고    scopus 로고
    • Security requirements for RFID computing systems
    • Mar
    • X. Zhang, and B. King, "Security requirements for RFID computing systems," International Journal of Network Security, vol. 6, no. 2, pp. 214V226, Mar. 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.2 , pp. 214-226
    • Zhang, X.1    King, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.