메뉴 건너뛰기




Volumn 35, Issue 6, 2012, Pages 2059-2067

PUF-enhanced offline RFID security and privacy

Author keywords

Compromise of reader; Privacy; PUF; RFID; Security

Indexed keywords

BACKEND SYSTEM; COMMUNICATION SOLUTIONS; COMPROMISE OF READER; COST-EFFICIENT; MOBILE ENVIRONMENTS; MUTUAL AUTHENTICATION; OFFLINE; OFFLINE MODES; PUF; RFID AUTHENTICATION; RFID SECURITY; RFID SYSTEMS; SECURE SYSTEM; SECURITY; SECURITY AND PRIVACY; SECURITY AND PRIVACY ISSUES; SPORT EVENTS; TICKETING SYSTEMS;

EID: 84867554249     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.08.006     Document Type: Article
Times cited : (50)

References (39)
  • 1
    • 33744957484 scopus 로고    scopus 로고
    • Adversarial model for radio frequency identification
    • Security and Cryptography Laboratory (LASEC)
    • Avoine G. Adversarial model for radio frequency identification. Tech. rep. Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC); 2005.
    • (2005) Tech. Rep. Swiss Federal Institute of Technology (EPFL)
    • Avoine, G.1
  • 7
    • 50249134033 scopus 로고    scopus 로고
    • Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
    • Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Conference on RFID security (RFIDSec); 2007.
    • (2007) Conference on RFID Security (RFIDSec)
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 10
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • ISSN: 0097-5397
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM Journal on Computing 38 1 2008 97 139 ISSN: 0097-5397
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 19
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • doi:10.1109/VLSIC.2004.1346548 Digest of technical papers
    • Lee J, Lim D, Gassend B, Suh G, van Dijk M, Devadas S. A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI circuits, 2004. Digest of technical papers; 2004. p. 176-9, http://dx.doi.org/10.1109/VLSIC.2004.1346548.
    • (2004) Symposium on VLSI Circuits, 2004 , pp. 176-179
    • Lee, J.1    Lim, D.2    Gassend, B.3    Suh, G.4    Van Dijk, M.5    Devadas, S.6
  • 23
    • 84867511846 scopus 로고    scopus 로고
    • WIPR - A public key implementation on two grains of sand
    • S. Dominikus
    • Y. Oren, and M. Feldhofer WIPR - a public key implementation on two grains of sand S. Dominikus, Workshop on RFID security 2008 2008 15 27
    • (2008) Workshop on RFID Security 2008 , pp. 15-27
    • Oren, Y.1    Feldhofer, M.2
  • 29
    • 85008008223 scopus 로고    scopus 로고
    • A digital 1.6 pJ/bit chip identification circuit using process variations
    • Y. Su, J. Holleman, and B.P. Otis A digital 1.6 pJ/bit chip identification circuit using process variations IEEE Journal of Solid-State Circuits 43 1 2008 69 77
    • (2008) IEEE Journal of Solid-State Circuits , vol.43 , Issue.1 , pp. 69-77
    • Su, Y.1    Holleman, J.2    Otis, B.P.3
  • 30
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • ACM/IEEE ISSN: 0738-100X
    • Suh G, Devadas S. Physical unclonable functions for device authentication and secret key generation. In: 44th design automation conference, 2007 (DAC 07). ACM/IEEE; 2007. p. 9-14, ISSN: 0738-100X.
    • (2007) 44th Design Automation Conference, 2007 (DAC 07) , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 31
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • New York, NY, USA: ACM ISBN: 978-1-59593-627-1
    • Suh GE, Devadas S. Physical unclonable functions for device authentication and secret key generation. In: DAC 07: proceedings of the 44th annual design automation conference. New York, NY, USA: ACM; 2007. p. 9-14, ISBN: 978-1-59593-627-1.
    • (2007) DAC 07: Proceedings of the 44th Annual Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 32
    • 85008055668 scopus 로고    scopus 로고
    • Secure and serverless RFID authentication and search protocols
    • C.C. Tan, B. Sheng, and Q. Li Secure and serverless RFID authentication and search protocols IEEE Transactions on Wireless Communications 7 4 2008 1400 1407
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.