메뉴 건너뛰기




Volumn 6, Issue 3, 2011, Pages 113-119

Security analysis of a privacy-preserving ECC-based grouping-proof protocol

Author keywords

Authentication protocol; ECC; RFID; Tracking attack

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; RADIO FREQUENCY IDENTIFICATION (RFID); SECURITY SYSTEMS;

EID: 79953702872     PISSN: 19759320     EISSN: None     Source Type: Journal    
DOI: 10.4156/jcit.vol6.issue3.13     Document Type: Article
Times cited : (25)

References (28)
  • 1
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and Privacy: A Research Survey
    • A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 9
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial Model for Radio Frequency Identification
    • G. Avoine, "Adversarial Model for Radio Frequency Identification", Cryptology ePrint Archive, Report 2005/049, http://eprint. iacr. org/, 2005.
    • (2005) Cryptology ePrint Archive, Report 2005/049
    • Avoine, G.1
  • 16
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol
    • Y. K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol", In IEEE International Conference on RFID, pp. 97-104, 2008.
    • (2008) IEEE International Conference on RFID , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 19
    • 77952353685 scopus 로고    scopus 로고
    • Untraceable RFID Protocols Are Not Trivially Composable: Attacks on The Revision of EC-RAC
    • University of Luxembourg
    • T. van Deursen and S. Radomirović, "Untraceable RFID Protocols Are Not Trivially Composable: Attacks on The Revision of EC-RAC", University of Luxembourg, Technical Report, 2009.
    • (2009) Technical Report
    • van Deursen, T.1    Radomirović, S.2
  • 23
    • 0020720357 scopus 로고
    • On the Security of Public-key Protocols
    • D. Dolev and A. Yao, "On the Security of Public-key Protocols", IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 28
    • 79952396973 scopus 로고    scopus 로고
    • Security Improvement in Authentication Protocol for Gen-2 Based RFID System
    • L. Wang, X. Yi, C. Lv, Y. Guo, "Security Improvement in Authentication Protocol for Gen-2 Based RFID System", JCIT: Journal of Convergence Information Technology, vol. 6, no. 1, pp. 157-169, 2011
    • (2011) JCIT: Journal of Convergence Information Technology , vol.6 , Issue.1 , pp. 157-169
    • Wang, L.1    Yi, X.2    Lv, C.3    Guo, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.