메뉴 건너뛰기




Volumn , Issue , 2012, Pages 811-816

Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol

Author keywords

Anti Counterfeiting; Batch Authentication; RFID

Indexed keywords

ANTI-COUNTERFEITING; AUTHENTICATION DATA; AUTHENTICATION PROTOCOLS; AUTHENTICATION TECHNIQUES; COUNTERFEIT PRODUCTS; DETECTION APPROACH; EXECUTION TIME; PHARMACEUTICAL INDUSTRY; PRODUCT INFORMATION; PROTOCOL EXECUTION; RETAIL INDUSTRY; RFID APPLICATIONS; RFID AUTHENTICATION; RFID SYSTEMS;

EID: 84861533406     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PerComW.2012.6197623     Document Type: Conference Paper
Times cited : (4)

References (26)
  • 1
    • 79551705940 scopus 로고    scopus 로고
    • Counterfeit goods and their potential financing of international terrorism
    • Z. A. Pollinger. "Counterfeit goods and their potential financing of international terrorism." In Michigan Journal of Business Vol. 1, No. 1. 2008. pp. 85-102.
    • (2008) Michigan Journal of Business , vol.1 , Issue.1 , pp. 85-102
    • Pollinger, Z.A.1
  • 4
    • 33750353849 scopus 로고    scopus 로고
    • A secure and efficient rfid protocol that could make big brother (partially) obsolete
    • T. Dimitriou. "A secure and efficient rfid protocol that could make big brother (partially) obsolete". In Proc. of PerCom 06. pp.269-275.
    • Proc. of PerCom 06 , pp. 269-275
    • Dimitriou, T.1
  • 5
    • 34547617482 scopus 로고    scopus 로고
    • Dynamic key updating privacy-preserving authentication for RFID systems
    • L. Lu, J. Han, L. Hu, Y. Lin, and L. M. Ni. "Dynamic key updating privacy-preserving authentication for RFID systems". In Proc. of PerCom 07. 2007. pp. 13-22.
    • Proc. of PerCom 07. 2007 , pp. 13-22
    • Lu, L.1    Han, J.2    Hu, L.3    Lin, Y.4    Ni, L.M.5
  • 6
    • 79957965485 scopus 로고    scopus 로고
    • AnonPri: An efficient anonymous private authentication protocol
    • M. E. Hoque, F. Rahman, and S. I. Ahamed, "AnonPri: An efficient anonymous private authentication protocol", In Proc. of PerCom 11, 2011. pp. 102-110.
    • Proc. of PerCom 11, 2011 , pp. 102-110
    • Hoque, M.E.1    Rahman, F.2    Ahamed, S.I.3
  • 8
    • 70349666896 scopus 로고    scopus 로고
    • ACTION: Breaking the privacy barrier for RFID systems
    • L. Lu, J. Han, R. Xiao, and Y. Lin. "ACTION: breaking the privacy barrier for RFID systems". In Proc.of INFOCOM 09. pp.1953-1961.
    • Proc.of INFOCOM 09 , pp. 1953-1961
    • Lu, L.1    Han, J.2    Xiao, R.3    Lin, Y.4
  • 9
    • 84940024494 scopus 로고    scopus 로고
    • Quantifying information leakage in tree-based hash protocols
    • K. Nohl and D. Evans. "Quantifying information leakage in tree-based hash protocols". In Proc. of ICICS 06. 2006. pp. 228-237.
    • Proc. of ICICS 06. 2006 , pp. 228-237
    • Nohl, K.1    Evans, D.2
  • 10
    • 33749512062 scopus 로고    scopus 로고
    • An enhanced dynamic flamed slotted aloha algorithm for RFID tag identification
    • R. Lee, S. D. Joo, and C. W. Lee. "An enhanced dynamic flamed slotted aloha algorithm for RFID tag identification," In Proc. of MobiQuitous 05, 2005. pp. 166-174.
    • Proc. of MobiQuitous 05, 2005 , pp. 166-174
    • Lee, R.1    Joo, S.D.2    Lee, C.W.3
  • 11
    • 78149282448 scopus 로고    scopus 로고
    • Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments
    • M. E. Hoque, F. Rahman, and S. I. Ahamed, and I. H. Park. "Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments", In Springer Wireless Personal Comm. Vol. 55, Iss. 1, 2009. pp. 65-79.
    • (2009) Springer Wireless Personal Comm , vol.55 , Issue.1 , pp. 65-79
    • Hoque, M.E.1    Rahman, F.2    Ahamed, S.I.3    Park, I.H.4
  • 12
    • 72949093749 scopus 로고    scopus 로고
    • Supporting recovery, privacy and security in RFID systems using a robust authentication protocol
    • M. E. Hoque, F. Rahman, and S. I. Ahamed. "Supporting recovery, privacy and security in RFID systems using a robust authentication protocol". In Proc. of SAC 09. 2009, pp. 1062-1066.
    • Proc. of SAC 09. 2009 , pp. 1062-1066
    • Hoque, M.E.1    Rahman, F.2    Ahamed, S.I.3
  • 15
    • 67650132302 scopus 로고    scopus 로고
    • Low cost SHA-1 hash function architecture for RFID tags
    • M. O'Neill. "Low cost SHA-1 hash function architecture for RFID tags". In Proc. of RFIDSec 08, 2008.
    • Proc. of RFIDSec 08, 2008
    • O'Neill, M.1
  • 16
    • 33751069820 scopus 로고    scopus 로고
    • Fast and reliable estimation schemes in RFID systems
    • M. Kodialam and T. Nandagopal. "Fast and reliable estimation schemes in RFID systems". In Proc. of MOBICOM 06. 2006. pp. 322-333.
    • Proc. of MOBICOM 06. 2006 , pp. 322-333
    • Kodialam, M.1    Nandagopal, T.2
  • 18
    • 33847056674 scopus 로고    scopus 로고
    • Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification
    • J. Myung and W. Lee. "Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification". In Proc. of BroadNets 05. 2005. pp. 347-355.
    • Proc. of BroadNets 05. 2005 , pp. 347-355
    • Myung, J.1    Lee, W.2
  • 20
    • 84861534623 scopus 로고    scopus 로고
    • E. Microelectronics. Datasheet
    • E. Microelectronics. Supertag category protocols. Datasheet. http://www.gaw.ru/doc/EM-Marin/P4022.PDF.
    • Supertag Category Protocols
  • 23
    • 79957668373 scopus 로고    scopus 로고
    • Identification free batch authentication for RFID tags
    • L. Yang, J. Han, Y. Qi, and Y. Liu. "Identification free batch authentication for RFID tags". In Proc. of ICNP. 2010. pp.154-163.
    • Proc. of ICNP. 2010 , pp. 154-163
    • Yang, L.1    Han, J.2    Qi, Y.3    Liu, Y.4
  • 25
    • 58649098157 scopus 로고    scopus 로고
    • RFID in pervasive computing: State-of-the-art and outlook
    • G. Roussos and V. Kostakos. "RFID in pervasive computing: state-of-the-art and outlook". In Pervasive and Mobile Comp., Vol. 5, Iss. 1. 2008. pp. 110-131.
    • (2008) Pervasive and Mobile Comp. , vol.5 , Issue.1 , pp. 110-131
    • Roussos, G.1    Kostakos, V.2
  • 26
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • D. Molnar, and D. Wagner. "Privacy and security in library RFID: Issues, practices, and architectures". In Proc. of CCS 04. 2004. pp. 210-219.
    • Proc. of CCS 04. 2004 , pp. 210-219
    • Molnar, D.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.