메뉴 건너뛰기




Volumn 2011, Issue , 2011, Pages

A salient missing link in RFID security protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL POWER; CRYPTOGRAPHIC OPERATIONS; CRYPTOGRAPHIC SYSTEMS; DATABASE QUERIES; DATABASE QUERYING; NORMAL MODES; RF-ID TAGS; RFID SECURITY PROTOCOLS; RFID SYSTEMS; SECURE RFID; SIDE CHANNEL ATTACK; SIDE-CHANNEL; SIDE-CHANNEL ANALYSIS; SIDE-CHANNEL INFORMATION; TIMING ATTACKS; UNTRACEABILITY;

EID: 79959253227     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1155/2011/541283     Document Type: Article
Times cited : (6)

References (36)
  • 1
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • Chien H. Y., Chen C. H., Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards Computer Standards and Interfaces 2007 29 2 254 259
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 3
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • Rhee K., Kwak J., Kim S., Won D., Hutter D., Ullmann M., Challenge-response based on RFID authentication protocol for distributed database environment 3450 Proceedings of the International Conference on Security in Pervasive Computing (SPC '05) 2005 Berlin, Germany Springer 70 84 Lecture Notes in Computer Science (Pubitemid 41274193)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 10
    • 44649155143 scopus 로고    scopus 로고
    • A family of dunces: Trivial RFID identification and authentication protocols
    • REPORT 2006/015
    • Tsudik G., A family of dunces: trivial RFID identification and authentication protocols Cryptology ePrint Archive 2007 Report 2006/015
    • (2007) Cryptology EPrint Archive
    • Tsudik, G.1
  • 13
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Berlin, Germany Springer Lecture Notes in Computer Science
    • Vaudenay S., On privacy models for RFID 4833 Proceedings of the Advances in Cryptology (ASIACRYPT '07) 2007 Berlin, Germany Springer 68 87 Lecture Notes in Computer Science
    • (2007) Proceedings of the Advances in Cryptology (ASIACRYPT '07) , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 22
    • 33751513718 scopus 로고    scopus 로고
    • Enhancing security of EPC global gen-2 RFID tag against traceability and cloning
    • Hiroshima, Japan The Institute of Electronics, Information and Communication Engineers
    • Duc D. N., Park J., Lee H., Kim K., Enhancing security of EPC global gen-2 RFID tag against traceability and cloning Proceedings of the Symposium on Cryptography and Information Security (SCIS '06) 2006 Hiroshima, Japan The Institute of Electronics, Information and Communication Engineers
    • (2006) Proceedings of the Symposium on Cryptography and Information Security (SCIS '06)
    • Duc, D.N.1    Park, J.2    Lee, H.3    Kim, K.4
  • 24
    • 34247218520 scopus 로고    scopus 로고
    • RFID mutual authentication scheme based on synchronized secret information
    • Hiroshima, Japan The Institute of Electronics, Information and Communication Engineers
    • Lee S., Asano T., Kim K., RFID mutual authentication scheme based on synchronized secret information Proceedings of the Symposium on Cryptography and Information Security (SCIS '06) 2006 Hiroshima, Japan The Institute of Electronics, Information and Communication Engineers
    • (2006) Proceedings of the Symposium on Cryptography and Information Security (SCIS '06)
    • Lee, S.1    Asano, T.2    Kim, K.3
  • 26
    • 59249097693 scopus 로고    scopus 로고
    • A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
    • Fouladgar S., Afifi H., A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags Journal of Communications 2007 2 6 6 13
    • (2007) Journal of Communications , vol.2 , Issue.6 , pp. 6-13
    • Fouladgar, S.1    Afifi, H.2
  • 30
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
    • Advances in Cryptology - CRYPTO '96
    • Kocher P., Koblitz N., Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems 1109 Proceedings of the Advances in Cryptology (CRYPTO 96) 1996 Berlin, Germany Springer 104 113 Lecture Notes in Computer Science (Pubitemid 126106234)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 33
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial model for radio frequency identification
    • REPORT 2005/049
    • Avoine G., Adversarial model for radio frequency identification Cryptology ePrint Archieve 2005 Report 2005/049. http://eprint.iacr.org
    • (2005) Cryptology EPrint Archieve
    • Avoine, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.