메뉴 건너뛰기




Volumn , Issue , 2011, Pages 51-56

An efficient and secure authentication protocol for RFID systems

Author keywords

authentication protocol; privacy; RFID; security; timestamp

Indexed keywords

AUTHENTICATION PROTOCOLS; DENIAL OF SERVICE ATTACKS; IDENTIFICATION NUMBER; INFORMATION LEAKAGE; LOCATION PRIVACY; PASSIVE RFID; PRIVACY AND SECURITY; PRIVACY VIOLATION; RANDOM NUMBERS; REPLAY ATTACK; RF-ID TAGS; RFID AUTHENTICATION; RFID SYSTEMS; SECURITY; SECURITY PROTECTION; SIMULATION EXPERIMENTS; TIME-STAMP;

EID: 83455214204     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (26)
  • 1
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • S. Garfinkel, A. Jules and R. Pappu, "RFID privacy: an overview of problems and proposed solutions," IEEE Security and Privacy. 3(3): 34-43, May/June 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3
    • Garfinkel, S.1    Jules, A.2    Pappu, R.3
  • 3
    • 84855195246 scopus 로고    scopus 로고
    • Web site, Referenced 2005 at
    • EPCglobal Web site, 2005. Referenced 2005 at http://www.EPCglobalinc.org.
    • (2005)
  • 4
    • 24944582157 scopus 로고    scopus 로고
    • Efficient Authentication for Low-Cost RFID systems
    • ICCSA05, Springer-Verlag
    • S.M. Lee, Y.J. Hwang, D.H. Lee and J.I. Lim, "Efficient Authentication for Low-Cost RFID systems," ICCSA05, vol. 3480 LNCS, pp.619-629, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3480 , pp. 619-629
    • Lee, S.M.1    Hwang, Y.J.2    Lee, D.H.3    Lim, J.I.4
  • 5
    • 32844471136 scopus 로고    scopus 로고
    • An Introduction to RFID Technology
    • R. Want,"An Introduction to RFID Technology," IEEE Pervasive Computing, vol. 5, pp. 25-33, 2005.
    • (2005) IEEE Pervasive Computing , vol.5 , pp. 25-33
    • Want, R.1
  • 7
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • R. Sandhu and R. Thomas, editors, Orlando, Florida, USA, March IEEE Computer Society
    • D. Henrici and P. Muller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers," In R. Sandhu and R. Thomas, editors, International Workshop on Pervasive Computing and Communication Security -PerSec 2004, pages 149-153, Orlando, Florida, USA, March 2004. IEEE Computer Society.
    • (2004) International Workshop on Pervasive Computing and Communication Security -PerSec 2004 , pp. 149-153
    • Henrici, D.1    Muller, P.2
  • 8
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • B. Pfitzmann and P. Liu, editors, Washington, DC, USA, October ACM Press
    • D. Molnar and D. Wagner, "Privacy and security in library RFID: Issues, practices, and architectures," In B. Pfitzmann and P. Liu, editors, Conference on Computer and Communications Security - ACM CCS, pages 210-219, Washington, DC, USA, October 2004. ACM Press.
    • (2004) Conference on Computer and Communications Security - ACM CCS , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 9
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • K. Rhee, J. Kwak, S. Kim and D. Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environmnet,"SPC 2005, LNCS 3450, pp. 70-84, 2005. (Pubitemid 41274193)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 11
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
    • H. Chien and C. Chen, "Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards," Computer Standards & Interfaces, 29(2):254-259, February 2007. (Pubitemid 44829930)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 16
    • 56749103027 scopus 로고    scopus 로고
    • RFID authentication protocol for low-cost tags
    • B. Song and C. J. Mitchell, "RFID authentication protocol for low-cost tags," In WISEC, pages 140-147, 2008.
    • (2008) WISEC , pp. 140-147
    • Song, B.1    Mitchell, C.J.2
  • 18
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols, Advances in Cryptology - ASYACRYPT'2001
    • Springer
    • N.J. Hopper and M. Blum, Secure human identification protocols, Advances in Cryptology - ASYACRYPT'2001, Lecture Notes in Computer Science, vol. 2248, Springer, 2001, pp.52-66.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 19
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • Proceedings of CRYPTO'05, Victor Shoup (Ed.), Springer- Verlag
    • A. Juels and S. Weis, Authenticating Pervasive Devices with Human Protocols, Proceedings of CRYPTO'05, Victor Shoup (Ed.), Springer- Verlag, LNCS 3261, pp. 293-308, 2005.
    • (2005) LNCS , vol.3261 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 24
    • 34247523203 scopus 로고    scopus 로고
    • HB-MP: A further step in the HB-family of lightweight authentication protocols
    • 2007
    • J. Munilla and A. Peinado, HB-MP: A further step in the HB-family of lightweight authentication protocols, Computer Netwroks 51 (2007), p.2262-2267, 2007.
    • (2007) Computer Netwroks , vol.51 , pp. 2262-2267
    • Munilla, J.1    Peinado, A.2
  • 26
    • 38149050502 scopus 로고    scopus 로고
    • A family of dunces: Trivial RFID identification and authentication protocols
    • N. Borisov and P. Golle, editors, Privacy Enhancing Technologies, 7th International Symposium - PET 2007, Ottawa, Canada, June Springer-Verlag, Berlin
    • G. Tsudik, A family of dunces: Trivial RFID identification and authentication protocols. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies, 7th International Symposium - PET 2007, volume 4776 of Lecture Notes in Computer Science, pages 45-61, Ottawa, Canada, June 2007. Springer-Verlag, Berlin.
    • (2007) Lecture Notes in Computer Science , vol.4776 , pp. 45-61
    • Tsudik, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.