메뉴 건너뛰기




Volumn 25, Issue 3, 2012, Pages 376-385

Server-less RFID authentication and searching protocol with enhanced security

Author keywords

anonymity; authentication; radio frequency identification (RFID); search

Indexed keywords

ANONYMITY; BACK-END SERVERS; CRYPTOGRAPHIC PROTOCOLS; RADIO FREQUENCIES; RFID APPLICATIONS; RFID AUTHENTICATION; RFID PROTOCOLS; SEARCH; SEARCHING PROTOCOLS; SECURITY WEAKNESS;

EID: 84857647179     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1246     Document Type: Article
Times cited : (51)

References (15)
  • 2
    • 68249160977 scopus 로고    scopus 로고
    • Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications
    • Park JH,. Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications. International Journal of Communication Systems 2009; 22 (8): 959-969.
    • (2009) International Journal of Communication Systems , vol.22 , Issue.8 , pp. 959-969
    • Park, J.H.1
  • 4
    • 68849120029 scopus 로고    scopus 로고
    • ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    • Chien H-Y, Laih C-S,. ECC-based lightweight authentication protocol with untraceability for low-cost RFID. Journal of Parallel and Distributed Computing 2009; 69 (10): 848-853.
    • (2009) Journal of Parallel and Distributed Computing , vol.69 , Issue.10 , pp. 848-853
    • Chien, H.-Y.1    Laih, C.-S.2
  • 6
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • Orlando, FL
    • Henrici AD, Mäuller P,. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. The Proceedings of PerSec'04 at IEEE PerCom, Orlando, FL, 2004; 149-153.
    • (2004) Proceedings of PerSec'04 at IEEE PerCom , pp. 149-153
    • Henrici, A.D.1    Mäuller, P.2
  • 8
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • Molnar D, Wagner D,. Privacy and security in library RFID: Issues, practices, and architectures. Conference on Computer and Communications Security CCS'04, Washington, DC, U.S.A., 2004; 210-219. (Pubitemid 40338202)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 9
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to 'privacy-friendly' tags
    • MIT Media Lab, U.S.A.
    • Ohkubo M, Suzki K, Kinoshita S,. Cryptographic approach to 'privacy-friendly' tags. RFID Privacy Workshop, MIT Media Lab, U.S.A., 2003.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzki, K.2    Kinoshita, S.3
  • 12
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultra-lightweight RFID authentication protocol providing strong authentication strong integrity
    • Chien HY,. SASI: a new ultra-lightweight RFID authentication protocol providing strong authentication strong integrity. IEEE Transactions on Dependable and Secure Computing 2007; 4 (4): 337-340.
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.Y.1
  • 13
    • 85008055668 scopus 로고    scopus 로고
    • Secure and serverless RFID authentication and search protocols
    • Tan CC, Sheng B, Li Q,. Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications 2008; 7 (4): 1400-1407.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.