메뉴 건너뛰기




Volumn 7459 LNCS, Issue , 2012, Pages 661-678

Relations among notions of privacy for RFID authentication protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; COMMUNICATION MESSAGES; INDISTINGUISHABILITY; PUBLIC VERIFIABILITY; RFID AUTHENTICATION; SECURITY MODEL; ZERO KNOWLEDGE;

EID: 84865605763     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33167-1_38     Document Type: Conference Paper
Times cited : (11)

References (22)
  • 2
    • 84957629783 scopus 로고    scopus 로고
    • Relations among Notions of Security for Public-Key Encryption Schemes
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 84957059629 scopus 로고    scopus 로고
    • Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Bellare, M., Sahai, A.: Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 519-536. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 519-536
    • Bellare, M.1    Sahai, A.2
  • 4
    • 77954695258 scopus 로고    scopus 로고
    • Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
    • Hong, S., Iwata, T. (eds.) FSE 2010. Springer, Heidelberg
    • Billet, O., Etrog, J., Gilbert, H.: Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 55-74. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6147 , pp. 55-74
    • Billet, O.1    Etrog, J.2    Gilbert, H.3
  • 5
    • 76849106311 scopus 로고    scopus 로고
    • Universally composable RFID identification and authentication protocols
    • Burmester, M., Le, T.V., Medeiros, B.D., Tsudik, G.: Universally composable RFID identification and authentication protocols. ACM TISSEC 2009 12(4), 21:1-21:33 (2009)
    • (2009) ACM TISSEC 2009 , vol.12 , Issue.4
    • Burmester, M.1    Le, T.V.2    Medeiros, B.D.3    Tsudik, G.4
  • 6
    • 50049108255 scopus 로고    scopus 로고
    • Provably secure ubiquitous systems: Universally composable RFID authentication protocols
    • IEEE
    • Burmester, M., van, Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: SecureComm 2006, pp. 1-9. IEEE (2006)
    • (2006) SecureComm 2006 , pp. 1-9
    • Burmester, M.1    Van Le, T.2    De Medeiros, B.3
  • 7
    • 70349749656 scopus 로고    scopus 로고
    • Data synchronization in privacy-preserving RFID authentication schemes
    • Canard, S., Coisel, I.: Data synchronization in privacy-preserving RFID authentication schemes. In: RFIDSec 2008 (2008)
    • (2008) RFIDSec 2008
    • Canard, S.1    Coisel, I.2
  • 9
    • 78049406406 scopus 로고    scopus 로고
    • A New Framework for RFID Privacy
    • Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
    • Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A New Framework for RFID Privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1-18. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6345 , pp. 1-18
    • Deng, R.H.1    Li, Y.2    Yung, M.3    Zhao, Y.4
  • 10
    • 57049137188 scopus 로고    scopus 로고
    • A New Formal Proof Model for RFID Location Privacy
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Ha, J., Moon, S.-J., Zhou, J., Ha, J.C.: A New Formal Proof Model for RFID Location Privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 267-281. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 267-281
    • Ha, J.1    Moon, S.-J.2    Zhou, J.3    Ha, J.C.4
  • 11
    • 80052972135 scopus 로고    scopus 로고
    • A New RFID Privacy Model
    • Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
    • Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A New RFID Privacy Model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 568-587. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6879 , pp. 568-587
    • Hermans, J.1    Pashalidis, A.2    Vercauteren, F.3    Preneel, B.4
  • 13
    • 84856112202 scopus 로고    scopus 로고
    • A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
    • Juels, A., Paar, C. (eds.) RFIDSec 2011. Springer, Heidelberg
    • Kardaş, S., Kiraz, M.S., Bingöl, M.A., Demirci, H.: A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 78-93. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7055 , pp. 78-93
    • Kardaş, S.1    Kiraz, M.S.2    Bingöl, M.A.3    Demirci, H.4
  • 14
    • 34748848124 scopus 로고    scopus 로고
    • Universally composable and forward-secure RFID authentication and authenticated key exchange
    • ACM
    • van Le, T., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: ASIACCS 2007, pp. 242-252. ACM (2007)
    • (2007) ASIACCS 2007 , pp. 242-252
    • Van Le, T.1    Burmester, M.2    De Medeiros, B.3
  • 15
    • 74049095938 scopus 로고    scopus 로고
    • RFID privacy: Relation between two notions, minimal condition, and efficient construction
    • ACM
    • Ma, C., Li, Y., Deng, R.H., Li, T.: RFID privacy: Relation between two notions, minimal condition, and efficient construction. In: ACMCCS 2009, pp. 54-65. ACM (2009)
    • (2009) ACMCCS 2009 , pp. 54-65
    • Ma, C.1    Li, Y.2    Deng, R.H.3    Li, T.4
  • 16
    • 57049184162 scopus 로고    scopus 로고
    • RFID Privacy Models Revisited
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID Privacy Models Revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-266. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 251-266
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 17
    • 45749087762 scopus 로고    scopus 로고
    • Traceable Privacy of Recent Provably-Secure RFID Protocols
    • Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
    • Ouafi, K., Phan, R.C.-W.: Traceable Privacy of Recent Provably-Secure RFID Protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 479-489. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5037 , pp. 479-489
    • Ouafi, K.1    Phan, R.C.-W.2
  • 18
    • 70349118926 scopus 로고    scopus 로고
    • Mutual authentication in RFID
    • ACM
    • Paise, R.I., Vaudenay, S.: Mutual authentication in RFID. In: ASIACCS 2008, pp. 292-299. ACM (2008)
    • (2008) ASIACCS 2008 , pp. 292-299
    • Paise, R.I.1    Vaudenay, S.2
  • 19
    • 38149112760 scopus 로고    scopus 로고
    • Relations among Notions of Nonmalleability for Encryption
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Pass, R., Shelat, A., Vaikuntanathan, V.: Relations Among Notions of Nonmalleability for Encryption. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 519-535. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 519-535
    • Pass, R.1    Shelat, A.2    Vaikuntanathan, V.3
  • 21
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 22
    • 84865576193 scopus 로고    scopus 로고
    • Privacy Models for RFID Schemes
    • Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
    • Vaudenay, S.: Privacy Models for RFID Schemes. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 65-65. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6370 , pp. 65-65
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.