메뉴 건너뛰기




Volumn 16, Issue 3, 2012, Pages 337-349

Security flaws in a recent RFID delegation protocol

Author keywords

Authentication; Delegation; RFID; Security

Indexed keywords

BACK-END SERVERS; COMPUTATIONAL LOADS; DELEGATION; DESYNCHRONIZATION ATTACK; IMPERSONATION ATTACK; NETWORK CONNECTIVITY; RADIOFREQUENCY IDENTIFICATION TAGS; SECURITY; SECURITY FLAWS; SECURITY POLICY; SECURITY PROPERTIES;

EID: 84860888306     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-011-0393-1     Document Type: Article
Times cited : (11)

References (29)
  • 2
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • IEEE Computer Society, Florida, USA
    • Henrici D, Müller P (2004) Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: International workshop on pervasive computing and communication security-PerSec 2004. IEEE Computer Society, Florida, USA, p 149-153
    • (2004) International Workshop on Pervasive Computing and Communication Security-PerSec 2004 , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 3
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • Molnar D, Wagner D (2004) Privacy and security in Library RFID: issues, practices, and architectures. In: Conference on computer and communications security. ACM CCS, Washington DC, USA, p 210-219 (Pubitemid 40338202)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 4
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • Rhee K, Kwak J, Kim S, Won D (2005) Challenge-response based RFID authentication protocol for distributed databaseenvironment. In: International conference on security in pervasive computing-SPC 2005. Lecture Notes in Computer Science, Springer-Verlag 3450:70-84 (Pubitemid 41274193)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 8
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
    • Chien H, Chen C (2007) Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput Stand Interfaces 29(2):254-259 (Pubitemid 44829930)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 10
    • 44649155143 scopus 로고    scopus 로고
    • A family of dunces: Trivial RFID identification and authentication protocols
    • Tsudik G (2007) A family of dunces: trivial RFID identification and authentication protocols. Cryptology ePrint Archive, Report 2006/015
    • (2007) Cryptology ePrint Archive, Report 2006/015
    • Tsudik, G.1
  • 15
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34:556-566
    • (2011) Comput Commun , vol.34 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 19
    • 59249097693 scopus 로고    scopus 로고
    • A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
    • Fouladgar S, Afifi H (2007) A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags. J Commun 2(6):6-13
    • (2007) J Commun , vol.2 , Issue.6 , pp. 6-13
    • Fouladgar, S.1    Afifi, H.2
  • 21
    • 26444478592 scopus 로고    scopus 로고
    • RFID traceability: A multilayer problem
    • Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
    • Avoine G, Oechslin P (2005) RFID traceability: a multilayer problem. In: Financial cryptography-FC'05. Lecture Notes in Computer Science, Springer-Verlag 3570:125-140 (Pubitemid 41425471)
    • (2005) Lecture Notes in Computer Science , vol.3570 , pp. 125-140
    • Avoine, G.1    Oechslin, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.