메뉴 건너뛰기




Volumn 10, Issue 4, 2011, Pages 375-383

Across-authority lightweight ownership transfer protocol

Author keywords

Design science research; Group recommendation system; Online community; Term frequency inverse document frequency weights

Indexed keywords

ASYNCHRONY; DENIAL OF SERVICE ATTACKS; DESIGN SCIENCE; FORWARD AND BACKWARD SECRECY; MOBILE RFID; MOBILE-RFID SERVICE; ONLINE COMMUNITIES; PASSIVE TAGS; TERM FREQUENCY-INVERSE DOCUMENT FREQUENCIES; TRANSFER PROTOCOL; TRANSFER SCHEME;

EID: 80052599286     PISSN: 15674223     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.elerap.2011.03.001     Document Type: Article
Times cited : (28)

References (37)
  • 1
    • 80052556044 scopus 로고    scopus 로고
    • 3GPP; TSG SA. 3G security; security architecture (release 8). 3GPP TS 33.102, March 2009
    • 3GPP; TSG SA. 3G security; security architecture (release 8). 3GPP TS 33.102, March 2009.
  • 2
    • 44149083053 scopus 로고    scopus 로고
    • The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application
    • DOI 10.1016/j.elerap.2006.12.004, PII S1567422307000026
    • Y.A. Au, and R.J. Kauffman The economics of mobile payments: understanding stakeholder issues for an emerging financial technology application Electronic Commerce Research and Applications 7 2 2008 141 164 (Pubitemid 351718564)
    • (2008) Electronic Commerce Research and Applications , vol.7 , Issue.2 , pp. 141-164
    • Au, Y.A.1    Kauffman, R.J.2
  • 3
    • 33845429530 scopus 로고    scopus 로고
    • Recommendation for the triple data encryption algorithm (TDEA) block cipher
    • revised, Computer Security Division, Computer Security Resource Center, National Institute of Standard and Technology, Gaithersburg, MD, May 19
    • Barker, W. C. Recommendation for the triple data encryption algorithm (TDEA) block cipher. NIST special publication SP 800-67 1.1, revised, Computer Security Division, Computer Security Resource Center, National Institute of Standard and Technology, Gaithersburg, MD, May 19, 2008. Available at csrc.nist.gov/publications/PubsSPs.html.
    • (2008) NIST Special Publication SP 800-67 1.1
    • Barker, W.C.1
  • 6
    • 33750402779 scopus 로고    scopus 로고
    • Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience
    • Frederickton, New Brunswick, Canada, October 2004
    • Engberg, S.; Harning, M.; and Jensen, C. Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust, Frederickton, New Brunswick, Canada, October 2004, 13-15.
    • Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust , pp. 13-15
    • Engberg, S.1    Harning, M.2    Jensen, C.3
  • 8
    • 34548814766 scopus 로고    scopus 로고
    • Strong crypto for RFID tags - A comparison of low-power hardware implementations
    • 4253019, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
    • Feldhofer, M.; and Wolkerstorfer, J. Strong crypto for RFID tags: A comparison of low-power hardware implementations. In Proceedings of the 2007 IEEE International Symposium on Circuits and Systems, New Orleans, LA, May 27-30, 2007, IEEE Computer Society Press, Washington, DC, 1839-1842. (Pubitemid 47448889)
    • (2007) Proceedings - IEEE International Symposium on Circuits and Systems , pp. 1839-1842
    • Feldhofer, M.1    Wolkerstorfer, J.2
  • 10
    • 63149151663 scopus 로고    scopus 로고
    • A simple delegation scheme for RFID systems (SiDeS)
    • Grapevine, TX, March 26-28 IEEE Computer Society Press, Washington, DC
    • Fouladgar, S.; and Afifi, H. A simple delegation scheme for RFID systems (SiDeS). In Proceedings of the 2007 IEEE International Conference on RFID, Grapevine, TX, March 26-28, 2007b, IEEE Computer Society Press, Washington, DC, 1-6.
    • (2007) Proceedings of the 2007 IEEE International Conference on RFID , pp. 1-6
    • Fouladgar, S.1    Afifi, H.2
  • 11
    • 59249097693 scopus 로고    scopus 로고
    • A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
    • S. Fouladgar, and H. Afifi A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags Journal of Communications 2 6 2007 6 13
    • (2007) Journal of Communications , vol.2 , Issue.6 , pp. 6-13
    • Fouladgar, S.1    Afifi, H.2
  • 12
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • DOI 10.1109/MSP.2005.78
    • S. Garfinkel, A. Juels, and R. Pappu RFID privacy: an overview of problems and proposed solutions IEEE Security and Privacy 3 3 2005 34 43 (Pubitemid 40860471)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 16
    • 77950800179 scopus 로고    scopus 로고
    • Tokyo, Japan
    • JR East. Mobile Suica. Tokyo, Japan. Available at www.jreast.co.jp/ mobilesuica/index.html.
    • Mobile Suica
    • East, J.R.1
  • 17
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels RFID security and privacy: a research survey IEEE Journal on Selected Areas in Communications 24 2 2006 381 394 (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 20
    • 35248846439 scopus 로고    scopus 로고
    • POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
    • ACM Press, New York, NY
    • Koralalage, K.H.S.S.; Selim, M.R.; Miura, J.; Goto, Y.; and Cheng, J. POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism. In Proceedings of the 2007 ACM Symposium on Applied Computing, March 2007, ACM Press, New York, NY, 270-275.
    • Proceedings of the 2007 ACM Symposium on Applied Computing, March 2007 , pp. 270-275
    • Koralalage, K.H.S.S.1    Selim, M.R.2    Miura, J.3    Goto, Y.4    Cheng, J.5
  • 23
    • 0038256558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. Advanced encryption standard (AES) Gaithersburg, MD, November
    • National Institute of Standards and Technology. Advanced encryption standard (AES). Federal information processing standards publication 197, Gaithersburg, MD, November 2001. Available at csrc.nist.gov/publications/fips/ fips197/fips-197.pdf.
    • (2001) Federal Information Processing Standards Publication 197
  • 25
    • 51849104796 scopus 로고    scopus 로고
    • Policy and role based mobile RFID user privacy data management system
    • April 7-11 Bahia, Salvador, Brazil
    • Park, N.; Song, Y.; and Won, D. Policy and role based mobile RFID user privacy data management system. In Proceedings of the Network Operations and Management Symposium, April 7-11, 2008, Bahia, Salvador, Brazil, 1003-1006.
    • (2008) Proceedings of the Network Operations and Management Symposium , pp. 1003-1006
    • Park, N.1    Song, Y.2    Won, D.3
  • 26
    • 34548860970 scopus 로고    scopus 로고
    • New light-weight crypto algorithms for RFID
    • 4253020, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
    • Poschmann, A.; Leander, G.; Schramm, K.; and Paar, C. New light-weight crypto algorithms for RFID. In Proceedings of the IEEE International Symposium on Circuits and Systems, New Orleans, LA, May 27-30, 2007, IEEE Computer Society Press, Washington, DC, 1843-1846. (Pubitemid 47448890)
    • (2007) Proceedings - IEEE International Symposium on Circuits and Systems , pp. 1843-1846
    • Poschmann, A.1    Leander, G.2    Schramm, K.3    Paar, C.4
  • 27
    • 33744907692 scopus 로고    scopus 로고
    • Low-cost RFID systems: Confronting security and privacy
    • 1Zurich, Switzerland, September
    • Ranasinghe, D.; Engels, D.; and Cole, P. Low-cost RFID systems: Confronting security and privacy. Auto-ID Labs Research Workshop, Zurich, Switzerland, September 2004.
    • (2004) Auto-ID Labs Research Workshop
    • Ranasinghe, D.1    Engels, D.2    Cole, P.3
  • 28
    • 0004448836 scopus 로고    scopus 로고
    • PKCS#1v2.1: RSA cryptography standard. Draft, Redford, MA, January 5
    • RSA Data Security. PKCS#1v2.1: RSA cryptography standard. Draft, Redford, MA, January 5, 2001. Available at ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2- 1.pdf.
    • (2001) RSA Data Security
  • 29
    • 37349006240 scopus 로고    scopus 로고
    • RFID opportunities for mobile telecommunication services
    • ITU-T Lighthouse, May
    • Seidler, C. RFID opportunities for mobile telecommunication services. Technical paper, ITU-T Lighthouse, May 2005. Available at www.itu.int/ITU-T/ techwatch/rfid.pdf.
    • (2005) Technical Paper
    • Seidler, C.1
  • 30
    • 70450162483 scopus 로고    scopus 로고
    • A new RFID authentication protocol with ownership transfer in an insecure communication environment
    • Shenyang, China, August 12-14 IEEE Computer Society Press, Washington, DC
    • Wang, C.H.; and Chin, S. A new RFID authentication protocol with ownership transfer in an insecure communication environment. In Proceedings of the Ninth International Conference on Hybrid Intelligent Systems, Shenyang, China, August 12-14, 2009, IEEE Computer Society Press, Washington, DC, 486-491.
    • (2009) Proceedings of the Ninth International Conference on Hybrid Intelligent Systems , pp. 486-491
    • Wang . C, H.1    Chin, S.2
  • 31
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • S. Weis, S. Sarma, R. Rivest, and D. Engels Security and privacy aspects of low-cost radio frequency identification systems Security in Pervasive Computing 2802 2004 201 212
    • (2004) Security in Pervasive Computing , vol.2802 , pp. 201-212
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 32
    • 42549100734 scopus 로고    scopus 로고
    • Computation-efficient multicast key distribution
    • DOI 10.1109/TPDS.2007.70759
    • L. Xu, and C. Huang Computation-efficient multicast key distribution IEEE Transactions on Parallel and Distributed Systems 19 5 2008 577 586 (Pubitemid 351583563)
    • (2008) IEEE Transactions on Parallel and Distributed Systems , vol.19 , Issue.5 , pp. 577-586
    • Xu, L.1    Huang, C.2
  • 34
  • 35
    • 80052605658 scopus 로고    scopus 로고
    • Mobile RFID ownership transfer across different authorities
    • Taipei, Taiwan, November
    • Yang, M. H.; and Tsai, T. C. Mobile RFID ownership transfer across different authorities. In 2009 National Computer Symposium, Taipei, Taiwan, November 2009, 508-519.
    • (2009) 2009 National Computer Symposium , pp. 508-519
    • Yang . M, H.1    Tsai, T.C.2
  • 37
    • 77951764163 scopus 로고    scopus 로고
    • Changing hands together: A secure group ownership transfer protocol for RFID tags
    • R. Sprague (ed.) Kauai, HI, January 2010, IEEE Computer Society Press, Washington, DC
    • Zuo, Y. J. Changing hands together: a secure group ownership transfer protocol for RFID tags. In R. Sprague (ed.), Proceedings of the 43th Hawaii International Conference on System Sciences, Kauai, HI, January 2010, IEEE Computer Society Press, Washington, DC.
    • Proceedings of the 43th Hawaii International Conference on System Sciences
    • Zuo, Y.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.