메뉴 건너뛰기




Volumn 8, Issue 4, 2011, Pages 548-563

On ultralightweight RFID authentication protocols

Author keywords

cryptoanalysis.; cryptographic protocols; RFID technology

Indexed keywords

AUTHENTICATION; DIGITAL STORAGE; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 79957590172     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2010.75     Document Type: Article
Times cited : (78)

References (32)
  • 1
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial model for radio frequency identification
    • G. Avoine, "Adversarial Model for Radio Frequency Identification," Cryptology ePrint Archive, Report 2005/049, http:// eprint.iacr.org/2005/049, 2005.
    • (2005) Cryptology EPrint Archive, Report 2005/049
    • Avoine, G.1
  • 2
    • 79957592918 scopus 로고    scopus 로고
    • Bibliography on security and privacy in RFID systems
    • Cambridge, Massachusetts, June
    • G. Avoine, "Bibliography on Security and Privacy in RFID Systems," Massachusetts Inst. of Technology, Cambridge, Massachusetts, http://lasecwww.epfl.ch/~gavoine/rfid/, June 2007.
    • (2007) Massachusetts Inst. of Technology
    • Avoine, G.1
  • 6
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • DOI 10.1109/TDSC.2007.70226
    • H. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 4, pp. 337- 340, Oct.-Dec. 2007. (Pubitemid 350125898)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 7
    • 77952285870 scopus 로고    scopus 로고
    • Security of ultra-lightweight RFID authentication protocols and its improvements
    • July
    • H. Chien and C. Hwang, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements," ACM SIGOPS Operating Systems Rev., vol. 41, no. 4, pp. 83-86, July 2007.
    • (2007) ACM SIGOPS Operating Systems Rev. , vol.41 , Issue.4 , pp. 83-86
    • Chien, H.1    Hwang, C.2
  • 8
    • 43149103199 scopus 로고    scopus 로고
    • RFID security: Tradeoffs between security and efficiency
    • I. Damgard and M. ∅stergaard, "RFID Security: Tradeoffs between Security and Efficiency," Proc. RSA Conf., pp. 318-332, 2008.
    • (2008) Proc. RSA Conf. , pp. 318-332
    • Damgard, I.1    Estergaard, M.2
  • 11
    • 44449155290 scopus 로고    scopus 로고
    • HB#: Increasing the security and efficiency of HB +
    • H. Gilbert, M.J.B. Robshaw, and Y. Seurin, "HB#: Increasing the Security and Efficiency of HB + ," Proc. EUROCRYPT '08, pp. 361- 378, 2008.
    • (2008) Proc. EUROCRYPT '08 , pp. 361-378
    • Gilbert, H.1    Robshaw, M.J.B.2    Seurin, Y.3
  • 13
    • 27644472569 scopus 로고    scopus 로고
    • +: A provably secure lightweight authentication protocol
    • DOI 10.1049/el:20052622
    • H. Gilbert, M.J.B. Robshaw, and H. Sibert, "An Active Attack against HB + a Provably Secure Lightweight Authentication Protocol," Electronics Letters, vol. 41, no. 21, pp. 1169-1170, 2005. (Pubitemid 41560540)
    • (2005) Electronics Letters , vol.41 , Issue.21 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 15
    • 45449101594 scopus 로고    scopus 로고
    • The vision of secure RFID
    • Aug.
    • A. Juels, "The Vision of Secure RFID," Proc. IEEE, vol. 95, no. 8, pp. 1507-1508, Aug. 2007.
    • (2007) Proc. IEEE , vol.95 , Issue.8 , pp. 1507-1508
    • Juels, A.1
  • 16
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • DOI 10.1109/MSP.2005.78
    • A. Juels, R. Pappu, and S. Garfinkel, "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security and Privacy, vol. 3, no. 3, pp. 34-43, May/June 2005. (Pubitemid 40860471)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 17
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • A. Juels and S. Weiss, "Authenticating Pervasive Devices with Human Protocols," Proc. CRYPTO '05, pp. 293-308, 2005.
    • (2005) Proc. CRYPTO '05 , pp. 293-308
    • Juels, A.1    Weiss, S.2
  • 26
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI
    • Oct.-Dec.
    • R.C.-W. Phan, "Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI," IEEE Trans. Dependable and Secure Computing, vol. 6, no. 4, pp. 316-320, Oct.-Dec. 2009.
    • (2009) IEEE Trans. Dependable and Secure Computing , vol.6 , Issue.4 , pp. 316-320
    • Phan, R.C.-W.1
  • 31
    • 50249161524 scopus 로고    scopus 로고
    • SQUASHA New MAC with provable security properties for highly constrained devices such as RFID tags
    • A. Shamir, "SQUASHA New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags," Proc. Fast Software Encryption (FSE '08), pp. 144-157, 2008.
    • (2008) Proc. Fast Software Encryption (FSE '08) , pp. 144-157
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.