메뉴 건너뛰기




Volumn , Issue , 2011, Pages 102-110

AnonPri: An efficient anonymous private authentication protocol

Author keywords

anonymous; authentication; privacy; RFID; security

Indexed keywords

ANONYMOUS; AUTHENTICATION SCHEME; EXHAUSTIVE SEARCH; GROUP-BASED; HIGH-SPEED; KEY COMPONENT; PRIVACY; PRIVACY PROTECTION; PRIVATE AUTHENTICATION; RFID; RFID SYSTEMS; SECURITY; TREE-BASED APPROACH; UNLINKABILITY;

EID: 79957965485     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOM.2011.5767573     Document Type: Conference Paper
Times cited : (18)

References (24)
  • 1
    • 79957949627 scopus 로고    scopus 로고
    • CASPIAN Press Release. Last accessed June 2010
    • CASPIAN Press Release. Metro's decision to drop the loyalty card, 2004. Last accessed June 2010 - http://www.spychips.com/metro/press-release-feb-27. html
    • (2004) Metro's Decision to Drop the Loyalty Card
  • 4
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Springer-Verlag, Germany
    • S. Weis, S. Sarma, R. Rivest, and D. Engels. "Security and privacy aspects of low-cost radio frequency identification systems". In Proc. of Security in Pervasive Computing (SPC 2003), Springer-Verlag, Vol. 2802. Germany. 2003. pp. 454-469.
    • (2003) Proc. of Security in Pervasive Computing (SPC 2003) , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 9
    • 34547630116 scopus 로고    scopus 로고
    • Technical report, Department of Computer Science, Tallahassee, Florida. USA
    • C. Chatmon, T. v. Le, and M. Burmester. "Secure anonymous RFID authentication protocols". Technical report, Florida State University, Department of Computer Science, Tallahassee, Florida. USA. 2006. http://www.cs.fsu.edu/~burmeste/TR-060112.pdf
    • (2006) Secure Anonymous RFID Authentication Protocols.
    • Chatmon, C.1    Le, T.V.2    Burmester, M.3
  • 12
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. Shannon. "A mathematical theory of communication". In Bell System Technical Journal, Vol. 27, 1948. pp. 379-423 and 623-656.
    • (1948) Bell System Technical Journal , vol.27
    • Shannon, C.1
  • 13
    • 34548830678 scopus 로고    scopus 로고
    • Practical attacks against RFID
    • A. Laurie. "Practical attacks against RFID". In Network Security, 2007(9). pp. 4-7.
    • (2007) Network Security , Issue.9 , pp. 4-7
    • Laurie, A.1
  • 15
    • 33745621564 scopus 로고    scopus 로고
    • Reducing time complexity in RFID systems
    • B. Preneel and S. Tavares (Eds.), Selected Areas in Cryptography, Springer
    • G. Avoine, E. Dysli, and P. Oechslin. "Reducing time complexity in RFID systems". In B. Preneel and S. Tavares (Eds.), Selected Areas in Cryptography, Springer, LNCS 3897. 2005. pp 291-306.
    • (2005) LNCS , vol.3897 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 18
    • 34547662182 scopus 로고    scopus 로고
    • Determining the Position and Orientation of Multi-Tagged Objects Using RFID Technology
    • doi: 10.1109/PERCOMW.2007.38
    • S. Hinske. "Determining the Position and Orientation of Multi-Tagged Objects Using RFID Technology". In Proc. of Pervasive Computing and Communications Workshops (PerCom Workshops 2007). 2007. pp.377-381. doi: 10.1109/PERCOMW.2007.38
    • (2007) Proc. of Pervasive Computing and Communications Workshops (PerCom Workshops 2007) , pp. 377-381
    • Hinske, S.1
  • 24
    • 70349368349 scopus 로고    scopus 로고
    • RFID in pervasive computing: Ctate-of-the-art and outlook
    • Elsevier
    • G. Roussos and V. Kostakos. "RFID in pervasive computing: ctate-of-the-art and outlook". In Pervasive and Mobile Comp., Elsevier, 2008.
    • (2008) Pervasive and Mobile Comp.
    • Roussos, G.1    Kostakos, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.