메뉴 건너뛰기




Volumn , Issue , 2011, Pages

An improved forward-secure anonymous RFID authentication protocol

Author keywords

Anonymity; Authentication protocol; Forward security; RFID

Indexed keywords

ANONYMITY; AUTHENTICATION PROTOCOLS; DAILY LIVES; DESYNCHRONIZATION ATTACK; FORWARD SECURITY; FORWARD-SECURE; MUTUAL AUTHENTICATION; NEW PROTOCOL; RADIO FREQUENCY IDENTIFICATION TECHNOLOGY; REPLAY ATTACK; RF-ID TAGS; RFID AUTHENTICATION; SECURITY AND PRIVACY; UNTRACEABILITY;

EID: 80054909605     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/wicom.2011.6040152     Document Type: Conference Paper
Times cited : (5)

References (9)
  • 1
    • 33144457479 scopus 로고    scopus 로고
    • Rfid security and privacy: A research survey
    • A. Juels, "Rfid security and privacy: a research survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 2
    • 43449134072 scopus 로고    scopus 로고
    • Lightweight cryptographic authentication in passive rfidtagged systems
    • S. Piramuthu, "Lightweight cryptographic authentication in passive rfidtagged systems," IEEE Transactions on Systems, Man, and Cybernetics, Part C, vol. 38, no. 3, pp. 360-376, 2008.
    • (2008) IEEE Transactions on Systems, Man, and Cybernetics, Part C , vol.38 , Issue.3 , pp. 360-376
    • Piramuthu, S.1
  • 3
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, delegatable pseudonym protocol enabling ownership transfer of rfid tags
    • D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of rfid tags," in Selected Areas in Cryptography, 2005, pp. 276-290.
    • (2005) Selected Areas in Cryptography , pp. 276-290
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 4
    • 77952345634 scopus 로고    scopus 로고
    • Robust, anonymous rfid authentication with constant key-lookup
    • M. Burmester, B. de Medeiros, and R. Motta, "Robust, anonymous rfid authentication with constant key-lookup," in ASIACCS, 2008, pp. 283-291.
    • (2008) ASIACCS , pp. 283-291
    • Burmester, M.1    De Medeiros, B.2    Motta, R.3
  • 5
    • 33750290259 scopus 로고    scopus 로고
    • Ya-trap: Yet another trivial rfid authentication protocol
    • G. Tsudik, "Ya-trap: Yet another trivial rfid authentication protocol," in PerCom Workshops, 2006, pp. 640-643.
    • (2006) PerCom Workshops , pp. 640-643
    • Tsudik, G.1
  • 6
    • 34547630116 scopus 로고    scopus 로고
    • Secure anonymous rfid authentication protocols
    • Florida A & M University, Tech. Rep.
    • C. Chatmon, T. van Le, and M. Burmester, "Secure anonymous rfid authentication protocols," Computer & Information Sciences, Florida A & M University, Tech. Rep., 2006.
    • (2006) Computer & Information Sciences
    • Chatmon, C.1    Van Le, T.2    Burmester, M.3
  • 7
    • 73149105959 scopus 로고    scopus 로고
    • An enhanced 2-pass optimistic anonymous rfid authentication protocol with forward security
    • L. He, S. Jin, T. Zhang, and N. Li, "An enhanced 2-pass optimistic anonymous rfid authentication protocol with forward security," in WiCOM, 2009, pp. 1-4.
    • (2009) WiCOM , pp. 1-4
    • He, L.1    Jin, S.2    Zhang, T.3    Li, N.4
  • 8
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • N. J. Hopper and M. Blum, "Secure human identification protocols," in ASIACRYPT, 2001, pp. 52-66.
    • (2001) ASIACRYPT , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 9
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in SPC, 2003, pp. 201-212.
    • (2003) SPC , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.