메뉴 건너뛰기




Volumn , Issue , 2011, Pages 324-328

Hash-based RFID tag mutual authentication scheme with retrieval efficiency

Author keywords

Authentication scheme; Forgery; Privacy; Retrieval; RFID

Indexed keywords

AUTHENTICATION SCHEME; AUTOMATIC IDENTIFICATION; BACK-END SERVERS; FORGERY; FUNDAMENTAL SOLUTIONS; INHERENT CHARACTERISTICS; MODULO OPERATION; MOVING OBJECTS; MUTUAL AUTHENTICATION; RETRIEVAL; RETRIEVAL EFFICIENCY; RF-ID TAGS; RFID SECURITY; RFID SYSTEMS; SECURITY PROBLEMS; SECURITY THREATS;

EID: 80051650158     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISPA.2011.65     Document Type: Conference Paper
Times cited : (8)

References (10)
  • 1
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels, "RFID Security and Privacy: a research survey, " IEEE journal on Selected Areas in Communications, 2006, vol.24, pp.381- 394. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 2
    • 33745761701 scopus 로고    scopus 로고
    • Scalable and flexible privacy protection scheme for RFID systems
    • LNCS
    • S.S. Yeo, S.K. Kim, "Scalable and Flexible Privacy Protection Scheme for RFID Systems, " ESAS 2005, LNCS, vol. 3813, pp. 153- 163.
    • ESAS 2005 , vol.3813 , pp. 153-163
    • Yeo, S.S.1    Kim, S.K.2
  • 3
    • 78049383154 scopus 로고    scopus 로고
    • Privacy versus scalability in radio frequency identification systems
    • Elsevier
    • B. Alomair, R. Poovendran, "Privacy versus Scalability in Radio Frequency Identification Systems, " Computer Communications, Elsevier, 2010, vol.33(18), pp.2155-2163.
    • (2010) Computer Communications , vol.33 , Issue.18 , pp. 2155-2163
    • Alomair, B.1    Poovendran, R.2
  • 5
    • 78751647847 scopus 로고    scopus 로고
    • Securing against Brute-force attack: A Hash-based RFID mutual authentication protocol using a secret value
    • Elsevier
    • J.S. Cho, S.S. Yeo, S.K. Kim, "Securing against Brute-force Attack: a Hash-based RFID Mutual Authentication Protocol using a Secret value, " Computer Communications, Elsevier, 2011, vol.34(3), pp.391-397.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 391-397
    • Cho, J.S.1    Yeo, S.S.2    Kim, S.K.3
  • 10
    • 78650123975 scopus 로고    scopus 로고
    • An ECDSA processor for RFID authentication
    • LNCS
    • M. Hutter, M. Feldhofer, T. Plos, "An ECDSA Processor for RFID Authentication, " RFIDSec 2010, LNCS, vol. 6370, pp. 189-202.
    • RFIDSec 2010 , vol.6370 , pp. 189-202
    • Hutter, M.1    Feldhofer, M.2    Plos, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.