메뉴 건너뛰기




Volumn 8, Issue 6, 2011, Pages 938-943

Fingerprinting RFID tags

Author keywords

Authentication; pervasive computing; unauthorized access; wireless sensor networks.

Indexed keywords

AUTHENTICATION; CLONE CELLS; COSTS; CRYPTOGRAPHY; NETWORK SECURITY; UBIQUITOUS COMPUTING; WIRELESS SENSOR NETWORKS;

EID: 80052902499     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2010.56     Document Type: Article
Times cited : (67)

References (33)
  • 3
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels, "RFID security and Privacy: A Research Survey," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 5
    • 33144462296 scopus 로고    scopus 로고
    • Hacking the prox card
    • S. Garfinkel and B. Rosenberg, eds. Addison-Wesley
    • J. Westhues, "Hacking the Prox Card," RFID: Applications, Security, and Privacy, S. Garfinkel and B. Rosenberg, eds., pp. 291-300, Addison-Wesley, 2005.
    • (2005) RFID: Applications, Security, and Privacy , pp. 291-300
    • Westhues, J.1
  • 7
    • 34548285839 scopus 로고    scopus 로고
    • Remote password extraction from RFID tags
    • DOI 10.1109/TC.2007.1050, Emergent Systems, Algorithms, and Architectures for Speech-Based Human Machine Interaction
    • Y. Oren and A. Shamir, "Remote Password Extraction from RFID Tags," IEEE Trans. Computers, vol. 56, no. 9, pp. 1292-1296, Sept. 2007. (Pubitemid 47322909)
    • (2007) IEEE Transactions on Computers , vol.56 , Issue.9 , pp. 1292-1296
    • Oren, Y.1    Shamir, A.2
  • 12
    • 34548815120 scopus 로고    scopus 로고
    • Are standards compliant elliptic curve cryptosystems feasible on RFID?
    • July
    • S.S. Kumar and C. Paar, "Are Standards Compliant Elliptic Curve Cryptosystems Feasible on RFID?" Proc. Workshop RFID Security, July 2006.
    • (2006) Proc. Workshop RFID Security
    • Kumar, S.S.1    Paar, C.2
  • 13
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication protocol
    • Y.K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol," IEEE Int'l Conf. RFID, pp. 97-104, 2008.
    • (2008) IEEE Int'l Conf. RFID , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 16
    • 26444478592 scopus 로고    scopus 로고
    • RFID traceability: A multilayer problem
    • Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
    • G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem," Proc. Financial Cryptography (FC '05), pp. 125-140, 2005. (Pubitemid 41425471)
    • (2005) Lecture Notes in Computer Science , vol.3570 , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 22
    • 0347227352 scopus 로고    scopus 로고
    • NIST/SEMATECH e-Handbook of Statistical Methods
    • NIST/SEMATECH e-Handbook of Statistical Methods. Nat'l Inst. of Standards and Technology, http://www.itl.nist.gov/div898/handbook, 2007.
    • (2007) Nat'l Inst. of Standards and Technology
  • 25
    • 1542487484 scopus 로고    scopus 로고
    • Cellular security: Better, but foes still lurk
    • June
    • M.J. Riezenman, "Cellular Security: Better, but Foes Still Lurk," IEEE Spectrum, vol. 37, no. 6, pp. 39-42, June 2000.
    • (2000) IEEE Spectrum , vol.37 , Issue.6 , pp. 39-42
    • Riezenman, M.J.1
  • 28
    • 50249134033 scopus 로고    scopus 로고
    • Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
    • D.E. Holcomb, W.P. Burleson, and K. Fu, "Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags," Proc. Conf. RFID Security, 2007.
    • (2007) Proc. Conf. RFID Security
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 29
    • 67649259238 scopus 로고    scopus 로고
    • Electromagnetic measurements for counterfeit detection of radio frequency identification cards
    • May
    • H.P. Romero, K.A. Remley, D.F. Williams, and C.-M. Wang, "Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards," IEEE Trans. Microwave Theory and Techniques, vol. 57, no. 5, pp. 1383-1387, May 2009.
    • (2009) IEEE Trans. Microwave Theory and Techniques , vol.57 , Issue.5 , pp. 1383-1387
    • Romero, H.P.1    Remley, K.A.2    Williams, D.F.3    Wang, C.-M.4
  • 31
    • 80052914438 scopus 로고    scopus 로고
    • Voyantic Ltd
    • Voyantic Ltd., http://www.voyantic.com, 2010.
    • (2010)
  • 33
    • 0025725905 scopus 로고
    • Instance-based learning algorithms
    • DOI 10.1023/A:1022689900470
    • D.W. Aha, D. Kibler, and M.K. Albert, "Instance-Based Learning Algorithms," Machine Learning, vol. 6, pp. 37-66, 1991. (Pubitemid 21727227)
    • (1991) Machine Learning , vol.6 , Issue.1 , pp. 37-66
    • Aha David, W.1    Kibler Dennis2    Albert Marc, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.