메뉴 건너뛰기




Volumn 352 AICT, Issue , 2011, Pages 192-205

50 Ways to break RFID privacy

Author keywords

attacks; privacy; RFID; taxonomy; untraceability

Indexed keywords

DATA PRIVACY; NETWORK LAYERS; RADIO FREQUENCY IDENTIFICATION (RFID); TAXONOMIES;

EID: 79958007947     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-20769-3_16     Document Type: Conference Paper
Times cited : (11)

References (29)
  • 1
    • 33845240394 scopus 로고    scopus 로고
    • Crossing borders: Security and privacy issues of the european e-passport
    • Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. Springer, Heidelberg
    • Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing borders: Security and privacy issues of the european e-passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 152-167. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4266 , pp. 152-167
    • Hoepman, J.-H.1    Hubbers, E.2    Jacobs, B.3    Oostdijk, M.4    Schreur, R.W.5
  • 3
    • 43149103199 scopus 로고    scopus 로고
    • RFID security: Tradeoffs between security and efficiency
    • Damgård, I., Pedersen, M.Ø.: RFID security: Tradeoffs between security and efficiency. In: CT-RSA, pp. 318-332 (2008)
    • (2008) CT-RSA , pp. 318-332
    • Damgård, I.1    Pedersen, M.Ø.2
  • 5
  • 6
    • 58149100777 scopus 로고    scopus 로고
    • Secure mobile RFID system against privacy and security problems
    • Kim, I.J., Choi, E.Y., Lee, D.H.: Secure mobile RFID system against privacy and security problems. In: SecPerU 2007 (2007)
    • (2007) SecPerU 2007
    • Kim, I.J.1    Choi, E.Y.2    Lee, D.H.3
  • 7
    • 0019009078 scopus 로고
    • OSI reference model - The ISO model of architecture for open systems interconnection
    • Zimmermann, H.: OSI reference model - The ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28(4), 425-432 (1980)
    • (1980) IEEE Transactions on Communications , vol.28 , Issue.4 , pp. 425-432
    • Zimmermann, H.1
  • 8
    • 26444478592 scopus 로고    scopus 로고
    • RFID traceability: A multilayer problem
    • S. Patrick, A., Yung, M. (eds.) FC 2005. Springer, Heidelberg
    • Avoine, G., Oechslin, P.: RFID traceability: A multilayer problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3570 , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 10
    • 33751067978 scopus 로고    scopus 로고
    • Practical attacks on proximity identification systems (short paper)
    • Hancke, G.P.: Practical attacks on proximity identification systems (short paper). In: IEEE Symposium on Security and Privacy, pp. 328-333 (2006)
    • (2006) IEEE Symposium on Security and Privacy , pp. 328-333
    • Hancke, G.P.1
  • 12
    • 85066934773 scopus 로고    scopus 로고
    • Physical-layer identification of RFID devices
    • Danev, B., Heydt-Benjamin, T.S., Čapkun, S.: Physical-layer identification of RFID devices. In: USENIX, pp. 125-136 (2009)
    • (2009) USENIX , pp. 125-136
    • Danev, B.1    Heydt-Benjamin, T.S.2    Čapkun, S.3
  • 13
    • 70350597641 scopus 로고    scopus 로고
    • Algebraic attacks on RFID protocols
    • Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. Springer, Heidelberg
    • van Deursen, T., Radomirović, S.: Algebraic attacks on RFID protocols. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol. 5746, pp. 38-51. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5746 , pp. 38-51
    • Van Deursen, T.1    Radomirović, S.2
  • 14
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers
    • Henrici, D., Müller, P.: Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers. In: PerCom Workshops, pp. 149-153 (2004)
    • (2004) PerCom Workshops , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 16
    • 77955313332 scopus 로고    scopus 로고
    • A Traceability Attack against e-Passports
    • Sion, R. (ed.) FC 2010. Springer, Heidelberg
    • Chothia, T., Smirnov, V.: A Traceability Attack against e-Passports. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 20-34. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6052 , pp. 20-34
    • Chothia, T.1    Smirnov, V.2
  • 17
    • 78650146719 scopus 로고    scopus 로고
    • Modeling privacy for off-line RFID systems
    • Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. Springer, Heidelberg
    • Garcia, F.D., van Rossum, P.: Modeling privacy for off-line RFID systems. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 194-208. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6035 , pp. 194-208
    • Garcia, F.D.1    Van Rossum, P.2
  • 18
    • 57049128814 scopus 로고    scopus 로고
    • Dismantling MIFARE classic
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 97-114
    • Garcia, F.D.1    De Koning Gans, G.2    Muijrers, R.3    Van Rossum, P.4    Verdult, R.5    Schreur, R.W.6    Jacobs, B.7
  • 20
    • 79958013347 scopus 로고    scopus 로고
    • Sneltreinvaart je privacy kwijt
    • (in Dutch). October
    • Teepe, W.: In sneltreinvaart je privacy kwijt (in Dutch). Privacy & Informatie (October 2008)
    • (2008) Privacy & Informatie
    • Teepe, W.1
  • 22
    • 3042776963 scopus 로고    scopus 로고
    • Time and date issues in forensic computing - A case study
    • Boyd, C., Forster, P.: Time and date issues in forensic computing - A case study. Digital Investigation 1(1), 18-23 (2004)
    • (2004) Digital Investigation , vol.1 , Issue.1 , pp. 18-23
    • Boyd, C.1    Forster, P.2
  • 24
    • 78650089685 scopus 로고    scopus 로고
    • EC-RAC: Enriching a capacious RFID attack collection
    • Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
    • van Deursen, T., Radomirović, S.: EC-RAC: Enriching a capacious RFID attack collection. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 75-90. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6370 , pp. 75-90
    • Van Deursen, T.1    Radomirović, S.2
  • 25
    • 77955457549 scopus 로고    scopus 로고
    • How unique is your web browser?
    • Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. Springer, Heidelberg
    • Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1-18. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6205 , pp. 1-18
    • Eckersley, P.1
  • 27
    • 77957367324 scopus 로고    scopus 로고
    • Office of Fair Trading: Personal current accounts in the UK (2008), http://www.oft.gov.uk/OFTwork/markets-work/completed/personal/
    • (2008) Personal Current Accounts in the UK


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.