메뉴 건너뛰기




Volumn 261 CCIS, Issue , 2011, Pages 246-255

RFID mutual authentication protocols using key exchange based on hash functions

Author keywords

Authentication; Hash; Key Exchange; RFID; XOR

Indexed keywords

BACK-END DATABASE; HASH; KEY EXCHANGE; KEY TECHNOLOGIES; MUTUAL AUTHENTICATION; NON-CONTACT; PROCESSING CAPABILITY; RADIO IDENTIFICATIONS; RFID COMMUNICATION; RFID PROTOCOLS; RFID SYSTEMS; SECURITY ISSUES; SECURITY PROBLEMS; UBIQUITOUS SOCIETY; XOR; XOR OPERATION;

EID: 83755168979     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-27180-9_30     Document Type: Conference Paper
Times cited : (3)

References (10)
  • 1
    • 35248872610 scopus 로고    scopus 로고
    • RFID Systems and Security and Privacy Implications
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 1-19. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 1-19
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 2
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 4
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifications
    • March
    • Henrici., D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifications. In: PerSec 2004, pp. 149-153 (March 2004)
    • (2004) PerSec 2004 , pp. 149-153
    • Henrici, D.1    Muller, P.2
  • 5
    • 24944582157 scopus 로고    scopus 로고
    • Efficient authentication for low-cost RFID systems
    • Computational Science and Its Applications - ICCSA 2005: International Conference, Proceeedings
    • Lee, S., Hwang, Y., Lee, D., Lim, J.: Efficient Authentication for Low-Cost RFID Systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619-627. Springer, Heidelberg (2005) (Pubitemid 41313878)
    • (2005) Lecture Notes in Computer Science , vol.3480 , Issue.I , pp. 619-627
    • Lee, S.M.1    Hwang, Y.J.2    Lee, D.H.3    Lim, J.I.4
  • 6
    • 33744950331 scopus 로고    scopus 로고
    • Hash-chain based forward-secure privacy protection scheme for low-cost RFID
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the SCIS 2004, pp. 719-724 (2004)
    • (2004) Proceedings of the SCIS 2004 , pp. 719-724
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 9
    • 2942556410 scopus 로고    scopus 로고
    • Radio Frequency Identification: Secure Risks and Challenges
    • Sarma, S.E., Weis, S.A., Engels, D.W.: Radio Frequency Identification: Secure Risks and Challenges. RSA Laboratories Cryptobytes 6(1), 2-9 (2003)
    • (2003) RSA Laboratories Cryptobytes , vol.6 , Issue.1 , pp. 2-9
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 10
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70-84. Springer, Heidelberg (2005) (Pubitemid 41274193)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.