메뉴 건너뛰기




Volumn , Issue , 2012, Pages 51-61

Location-aware and safer cards: Enhancing RFID security and privacy via location sensing

Author keywords

Context recognition; GPS; Relay attacks; RFID

Indexed keywords

AUXILIARY DEVICE; BACK-END SERVERS; CONTEXT RECOGNITION; CREDIT CARDS; LOCATION AWARENESS; LOCATION-AWARE; LOCATION-SENSING; PAYMENT TRANSACTIONS; RELAY ATTACK; RF-ID TAGS; RFID APPLICATIONS; RFID SECURITY; RFID SYSTEMS; SECURE TRANSACTIONS; SECURITY AND PRIVACY; TECHNOLOGICAL ADVANCEMENT; USER INVOLVEMENT;

EID: 84860673845     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2185448.2185457     Document Type: Conference Paper
Times cited : (14)

References (46)
  • 1
    • 84860697497 scopus 로고    scopus 로고
    • RFID toll collection systems, 2007. Available at: http://www.securitysa. com/news.aspx?pklnewsid=25591.
    • (2007) RFID Toll Collection Systems
  • 4
    • 84860658288 scopus 로고    scopus 로고
    • GPS Glossory, 2011. Available at: http://www.gsmarena.com/glossary.php3? term=gps.
    • (2011) GPS Glossory
  • 5
    • 84860685161 scopus 로고    scopus 로고
    • NMEA 0183 Standard, 2011. Available at: http://www.nmea.org/content/nmea- standards/nmea-083-v-400.asp.
    • (2011) NMEA 0183 Standard
  • 11
    • 70349301622 scopus 로고    scopus 로고
    • RFIDs and secret handshakes: Defending against Ghost-and-Leech attacks and unauthorized reads with context-aware communications
    • A. Czeskis, K. Koscher, J. Smith, and T. Kohno. RFIDs and secret handshakes: Defending against Ghost-and-Leech attacks and unauthorized reads with context-aware communications. In ACM Conference on Computer and Communications Security, 2008.
    • (2008) ACM Conference on Computer and Communications Security
    • Czeskis, A.1    Koscher, K.2    Smith, J.3    Kohno, T.4
  • 12
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close:Distance bounding against smartcard relay attacks
    • August
    • S. Drimer and S. J. Murdoch. Keep your enemies close:Distance bounding against smartcard relay attacks. In 16th USENIX Security Symposium, August 2007.
    • (2007) 16th USENIX Security Symposium
    • Drimer, S.1    Murdoch, S.J.2
  • 20
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2):381-394, February 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 29
    • 25844454876 scopus 로고    scopus 로고
    • An asymmetric security mechanism for navigation signals
    • M. Kuhn. An asymmetric security mechanism for navigation signals. In 6th Information Hiding Workshop, 2004.
    • (2004) 6th Information Hiding Workshop
    • Kuhn, M.1
  • 31
  • 36
  • 40
    • 84860658281 scopus 로고    scopus 로고
    • Still and silent: Motion detection for enhanced rfid security and privacy without changing the usage model
    • June
    • N. Saxena and J. Voris. Still and silent: Motion detection for enhanced rfid security and privacy without changing the usage model. In Workshop on RFID Security (RFIDSec), June 2010.
    • (2010) Workshop on RFID Security (RFIDSec)
    • Saxena, N.1    Voris, J.2
  • 45
    • 84860655027 scopus 로고    scopus 로고
    • Privacy in pervasive computing: What can technologists do?
    • online, September
    • D. Wagner. Privacy in pervasive computing: What can technologists do? Invited talk, SECURECOMM 2005. Available online at http://www.cs.berkeley.edu/ ~daw/talks/SECCOM05.ppt, September 2005.
    • (2005) Invited Talk, SECURECOMM 2005
    • Wagner, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.