메뉴 건너뛰기




Volumn 24, Issue 9, 2011, Pages 1196-1211

A hidden mutual authentication protocol for low-cost RFID tags

Author keywords

information privacy; low cost tags; mutual authentication; RFID security

Indexed keywords

CHALLENGE RESPONSE; IDENTITY AUTHENTICATION; INFORMATION PRIVACY; LOCATION PRIVACY; LOW-COST TAGS; MUTUAL AUTHENTICATION; RADIO FREQUENCIES; REPLAY ATTACK; RF-ID TAGS; RFID SECURITY; RFID SYSTEMS; SECURITY PROTOCOLS; SECURITY REQUIREMENTS; WIRELESS SIGNALS;

EID: 80052119674     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1222     Document Type: Article
Times cited : (23)

References (26)
  • 2
  • 3
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • Juels A,. RFID security and privacy: a research survey. IEEE Journals on Selected Areas in Communications 2006; 24 (2): 381-394. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 4
    • 18744409344 scopus 로고    scopus 로고
    • The blocker tag: Selective blocking of RFID tags for consumer privacy
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • Juels A, Rivest RL, Szydlo M,. The blocker tag: selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington, DC, U.S.A., October 2003; 103-111. (Pubitemid 40673793)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 103-111
    • Juels, A.1    Rivest, R.L.2    Szydlo, M.3
  • 6
    • 33745797863 scopus 로고    scopus 로고
    • Untraceable RFID tag via insubvertible encryption
    • DOI 10.1145/1102120.1102134, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • Ateniese G, Camenisch J, de Medeiros B.,. Untraceable RFID tags via insubvertible encryption. Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005). ACM Press: Alexandria, VA, U.S.A., November 2005; 92-101. (Pubitemid 44021993)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 92-101
    • Ateniese, G.1    Camenisch, J.2    De Medeiros, B.3
  • 8
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • Amalfi, Italia. Lecture Notes in Computer Science, 3352. Springer: Berlin, September
    • Juels A.,. Minimalist cryptography for low-cost RFID tags. Proceedings of Security in Communication Networks (SCN 2004), Amalfi, Italia. Lecture Notes in Computer Science, vol. 3352. Springer: Berlin, September 2004; 149-164.
    • (2004) Proceedings of Security in Communication Networks (SCN 2004) , pp. 149-164
    • Juels, A.1
  • 9
    • 64249137046 scopus 로고    scopus 로고
    • A hybrid approach for privacy-preserving RFID tags
    • Ryu E-K, Takagi T,. A hybrid approach for privacy-preserving RFID tags. Computer Standards and Interfaces 2009; 31 (4): 812-815.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.4 , pp. 812-815
    • Ryu, E.-K.1    Takagi, T.2
  • 11
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers
    • IEEE Computer Society: Orlando, FL, U.S.A. March
    • Henrici D, Muller P,. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. Proceedings of Pervasive Computing and Communication Security (PerSec 2004). IEEE Computer Society: Orlando, FL, U.S.A., March 2004; 149-153.
    • (2004) Proceedings of Pervasive Computing and Communication Security (PerSec 2004) , pp. 149-153
    • Henrici, D.1    Muller, P.2
  • 15
    • 67349277179 scopus 로고    scopus 로고
    • PAP: A privacy and authentication protocol for passive RFID tags
    • Liu AX, Bailey LA,. PAP: a privacy and authentication protocol for passive RFID tags. Computer Communications 2009; 32 (7-10): 1194-1199.
    • (2009) Computer Communications , vol.32 , Issue.710 , pp. 1194-1199
    • Liu, A.X.1    Bailey, L.A.2
  • 16
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID mutual authentication scheme in pervasive computing environment
    • Kang S-Y, Lee D-G, Lee I-Y,. A study on secure RFID mutual authentication scheme in pervasive computing environment. Computer Communications 2008; 31 (18): 4248-4254.
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4248-4254
    • Kang, S.-Y.1    Lee, D.-G.2    Lee, I.-Y.3
  • 19
    • 68249160977 scopus 로고    scopus 로고
    • Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications
    • Park JH,. Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications. International Journal of Communication Systems 2009; 22 (6): 959-969.
    • (2009) International Journal of Communication Systems , vol.22 , Issue.6 , pp. 959-969
    • Park, J.H.1
  • 20
    • 35248832722 scopus 로고    scopus 로고
    • Squealing euros: Privacy protection in RFID-enabled banknotes
    • Le Gosier, Guadeloupe, French West Indies. Lecture Notes in Computer Science, Springer: Berlin, January
    • Juels A, Pappu R,. Squealing euros: privacy protection in RFID-enabled banknotes. Proceedings of the Financial Cryptography (FC 2003), Le Gosier, Guadeloupe, French West Indies. Lecture Notes in Computer Science, vol. 2742. Springer: Berlin, January 2003; 103-121.
    • (2003) Proceedings of the Financial Cryptography (FC 2003) , vol.2742 , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 22
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
    • Kingston, Canada. Lecture Notes in Computer Science, Springer: Berlin, August
    • David M, Andrea S, David W,. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. Selected Areas in Cryptography (SAC 2005), Kingston, Canada. Lecture Notes in Computer Science, vol. 3897. Springer: Berlin, August 2005; 276-290.
    • (2005) Selected Areas in Cryptography (SAC 2005) , vol.3897 , pp. 276-290
    • David, M.1    Andrea, S.2    David, W.3
  • 26
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • Molnar D, Wagner D.,. Privacy and security in library RFID: issues, practices, and architectures. Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington, DC, U.S.A., October 2004; 210-219. (Pubitemid 40338202)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.