메뉴 건너뛰기




Volumn , Issue , 2011, Pages 417-424

Mutual authentication protocol for networked RFID systems

Author keywords

Authentication; Confidentiality; Protocol; RFD; Security; Transmission Integrity

Indexed keywords

CONFIDENTIALITY; HYBRID METHOD; MUTUAL AUTHENTICATION; PROTOCOL; RESOURCE REQUIREMENTS; RFD; RFID APPLICATIONS; RFID SECURITY PROTOCOLS; RFID SYSTEMS; SECURE COMMUNICATIONS; SECURITY;

EID: 84856207915     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2011.54     Document Type: Conference Paper
Times cited : (12)

References (27)
  • 2
    • 34547367358 scopus 로고    scopus 로고
    • The pros and cons of RFID in supply chain management
    • Sydney, Australia: Springer Berlin / Heidelberg
    • K. Michael and L. McCathie. "The pros and cons of RFID in supply chain management". in International Conference on Mobile Business. Sydney, Australia: Springer Berlin / Heidelberg, 2005
    • (2005) International Conference on Mobile Business
    • Michael, K.1    McCathie, L.2
  • 5
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • DOI 10.1109/TDSC.2007.70226
    • H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity". Transactions on Dependable and Secure Computing. vol. 4, 2007, pp. 337-340. (Pubitemid 350125898)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 11
    • 41549156956 scopus 로고    scopus 로고
    • A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection
    • Australia: Springer Berlin / Heidelberg
    • J. Lim, H. Oh and S. Kim. "A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection". in 4th International Conference on Information Security Practice and Experience Sydney, Australia: Springer Berlin / Heidelberg, 2008
    • (2008) 4th International Conference on Information Security Practice and Experience Sydney
    • Lim, J.1    Oh, H.2    Kim, S.3
  • 12
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • H.Y. Chien and C.H. Chen, "Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards". Computer Standards & Interfaces. vol. 29, 2007, pp. 254-259.
    • (2007) Computer Standards & Interfaces. , vol.29 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 14
    • 33645970405 scopus 로고    scopus 로고
    • Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting
    • Singapore: Springer Berlin / Heidelberg
    • X. Zhang and B. King. "Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting". in 8th International Conference on Information security. Singapore: Springer Berlin / Heidelberg, 2005
    • (2005) 8th International Conference on Information Security
    • Zhang, X.1    King, B.2
  • 15
    • 67650109513 scopus 로고    scopus 로고
    • Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
    • Hiroshima, Japan: Springer Berlin / Heidelberg
    • D.N. Duc, J. Park, H. Lee and K. Kim. "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning". in Symposium on Cryptography and Information Security. Hiroshima, Japan: Springer Berlin / Heidelberg, 2006
    • (2006) Symposium on Cryptography and Information Security
    • Duc, D.N.1    Park, J.2    Lee, H.3    Kim, K.4
  • 17
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • A. Juels, "Minimalist cryptography for low-cost RFID tags". Security in Communication Networks. vol. 3352, 2004, pp. 149-164.
    • (2004) Security in Communication Networks , vol.3352 , pp. 149-164
    • Juels, A.1
  • 20
    • 70449990339 scopus 로고    scopus 로고
    • Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI
    • R. Phan, "Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI". IEEE Transactions on Dependable and Secure Computing. vol. 99, 2008.
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.99
    • Phan, R.1
  • 22
    • 45949090154 scopus 로고    scopus 로고
    • Enhancing information flow in a retail supply chain using RFID and the EPC network
    • S.F. Wamba and H. Boeck, "Enhancing information flow in a retail supply chain using RFID and the EPC network". J. Theor. Appl. Electron. Commer. Res., vol. 3, 2008, pp. 92-105.
    • (2008) J. Theor. Appl. Electron. Commer. Res. , vol.3 , pp. 92-105
    • Wamba, S.F.1    Boeck, H.2
  • 24
    • 42549157259 scopus 로고    scopus 로고
    • A framework for assessing RFID system security and privacy risks
    • DOI 10.1109/MPRV.2008.22, 4487091
    • P. Rotter, "A framework for assessing RFID system security and privacy risks". IEEE Pervasive Computing. vol. 7, 2008, pp. 70-77. (Pubitemid 351575124)
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.2 , pp. 70-77
    • Rotter, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.