메뉴 건너뛰기




Volumn , Issue , 2012, Pages 558-563

Mutual authentication protocol for enhanced RFID security and anti-counterfeiting

Author keywords

Anti counterfeiting; NLM 128 stream cipher; OTP; RFID mutual authentication protocol; RFID Security

Indexed keywords

ANTI-COUNTERFEITING; MUTUAL AUTHENTICATION; OTP; RFID SECURITY; STREAM CIPHERS;

EID: 84860739148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WAINA.2012.12     Document Type: Conference Paper
Times cited : (17)

References (27)
  • 2
    • 84860705878 scopus 로고    scopus 로고
    • PUF ROKs: Generating read-once keys from physically unclonable functions (extended abstract)
    • April 21-23, Oak Ridge, Tennessee, USA
    • Michael S. Kirkpatrick, Elisa Bertino, Sam Kerr.: PUF ROKs: Generating Read-Once Keys from Physically Unclonable Functions (Extended Abstract). In: CSIIRW'10, April 21-23, Oak Ridge, Tennessee, USA.
    • CSIIRW'10
    • Kirkpatrick, M.S.1    Bertino, E.2    Kerr, S.3
  • 4
    • 77749299135 scopus 로고    scopus 로고
    • NLM-128, An improved LM-type summation generator with 2-bit memories
    • Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim: NLM-128, An Improved LM-type Summation Generator with 2-bit memories. In: ICCIT'09, pp. 577-582.
    • ICCIT'09 , pp. 577-582
    • Lee, H.J.1    Sung, S.M.2    Kim, H.R.3
  • 6
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SLAVM J. Comput., 38(1):97-139, 2008
    • (2008) SLAVM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 9
    • 33745654539 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting
    • volume 3860 of LNCS
    • Pim Tuyls, Lejla Batina.: RFID-Tags for Anti-Counterfeiting. In Topics in Cryptology- CT-RSA 2006, volume 3860 of LNCS, pages 115-131, 2006.
    • (2006) Topics in Cryptology- CT-RSA 2006 , pp. 115-131
    • Tuyls, P.1    Lejla, B.2
  • 17
    • 84860758754 scopus 로고    scopus 로고
    • An RFID authentication protocol based symmetric key using hashed tag ID
    • Dec.
    • Yong Soo Park, et al.: An RFID Authentication Protocol based symmetric key Using Hashed Tag ID: The Korea Information Processing Society: Vol.16-C, No.6: Dec. 2009.
    • (2009) The Korea Information Processing Society , vol.16-C , Issue.6
    • Park, Y.S.1
  • 18
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification system
    • Stepan A. Weis, et al.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification System: Security in Prevasive Computing-SPC 2003: LNCS 2802: pp.201-212: (2004)
    • (2004) Security in Prevasive Computing-SPC 2003: LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1
  • 20
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID mutual authentication scheme in pervasive computing environment
    • S. Kang, D. Lee, and I. Lee.: A study on secure RFID mutual authentication scheme in pervasive computing environment: Computer Communications 31: pp.4248-4254: (2008)
    • (2008) Computer Communications , vol.31 , pp. 4248-4254
    • Kang, S.1    Lee, D.2    Lee, I.3
  • 23
    • 0001120657 scopus 로고    scopus 로고
    • Fast correlation attacks on the summation generator
    • J. Golic, and M. Salmasizadeh and E. Dawson, Fast Correlation Attacks on the Summation Generator," Journal of Cryptology, Vol. 13, No. 2, pp.245-262, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.2 , pp. 245-262
    • Golic, J.1    Salmasizadeh, M.2    Dawson, E.3
  • 24
    • 0343167987 scopus 로고    scopus 로고
    • On an improved summation generator with 2-bit memory
    • Jan.
    • Hoonjae Lee, Sangjae Moon, "On An Improved Summation Generator with 2-Bit Memory," Signal Processing, 80(1), pp. 211217, Jan. 2000.
    • (2000) Signal Processing , vol.80 , Issue.1 , pp. 211217
    • Lee, H.1    Moon, S.2
  • 26
    • 0032639401 scopus 로고    scopus 로고
    • An efficient inplementation of the D-homomorphism for generation of de bruijn sequences
    • T. Chang, B. Park, Y. H. Kim, "An Efficient Inplementation of the D-Homomorphism for Generation of de Bruijn Sequences", IEEE Transactions on Information Theory, 45, 4, 1280-1283, 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.4 , pp. 1280-1283
    • Chang, T.1    Park, B.2    Kim, Y.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.