메뉴 건너뛰기




Volumn 339 CCIS, Issue , 2012, Pages 70-77

Enhanced hash-based RFID mutual authentication protocol

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; AUTOMATIC IDENTIFICATION; COMMUNICATION COST; DESYNCHRONIZATION; MOVING OBJECTS; MUTUAL AUTHENTICATION; PRIVACY AND SECURITY; RFID TECHNOLOGY;

EID: 84869754446     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-35264-5_10     Document Type: Conference Paper
Times cited : (9)

References (17)
  • 1
    • 84655177743 scopus 로고    scopus 로고
    • Extending the EPC network: The potential of RFID in anti-counterfeiting
    • Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network: the potential of RFID in anti-counterfeiting. Auto-ID Labs White Paper (2005)
    • (2005) Auto-ID Labs White Paper
    • Staake, T.1    Thiesse, F.2    Fleisch, E.3
  • 3
    • 67349277179 scopus 로고    scopus 로고
    • PAP: A privacy and authentication protocol for passive RFID tags
    • Liu, A.X., Bailey, L.A.: PAP: A privacy and authentication protocol for passive RFID tags. Computer Communications 32(7-10), 1194-1199 (2009)
    • (2009) Computer Communications , vol.32 , Issue.7-10 , pp. 1194-1199
    • Liu, A.X.1    Bailey, L.A.2
  • 4
    • 84865741288 scopus 로고    scopus 로고
    • A minimum disclosure approach to authentication and privacy in RFID systems
    • in press
    • Doss, R., Zhou, W., Sundaresan, S., Yu, S., Gao, L.: A minimum disclosure approach to authentication and privacy in RFID systems. Computer Networks (in press, 2012), http://dx.doi.org/10.1016/j.comnet.20-12.06.018
    • (2012) Computer Networks
    • Doss, R.1    Zhou, W.2    Sundaresan, S.3    Yu, S.4    Gao, L.5
  • 5
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Juels, A.: RFID security and privacy: a research survey. Selected Areas in Communications 24(2), 381-394 (2006)
    • (2006) Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 6
    • 33745761701 scopus 로고    scopus 로고
    • Scalable and Flexible Privacy Protection Scheme for RFID Systems
    • Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. Springer, Heidelberg
    • Yeo, S.-S., Kim, S.K.: Scalable and Flexible Privacy Protection Scheme for RFID Systems. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 153-163. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3813 , pp. 153-163
    • Yeo, S.-S.1    Kim, S.K.2
  • 9
    • 35248872610 scopus 로고    scopus 로고
    • RFID Systems and Security and Privacy Implications
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454-469. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 454-469
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 12
    • 33750291916 scopus 로고    scopus 로고
    • RFID Systems: A Survey on Security Threats and Proposed Solutions
    • Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. Springer, Heidelberg
    • Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159-170. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4217 , pp. 159-170
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 15
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 16
    • 84919847483 scopus 로고    scopus 로고
    • Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
    • doi:10.1016/j.camwa.2012.02.025
    • Cho, J.S., Jeong, Y.S., Park, S.O.: Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, doi:10.1016/j.camwa.2012.02.025
    • Computers and Mathematics with Applications
    • Cho, J.S.1    Jeong, Y.S.2    Park, S.O.3
  • 17
    • 84869783330 scopus 로고    scopus 로고
    • Desynchronization Attack on Hash-based RFID Mutual Authentication Protocol
    • Kim, H.: Desynchronization Attack on Hash-based RFID Mutual Authentication Protocol. Journal of Security Engineering 9(4), 357-365 (2012)
    • (2012) Journal of Security Engineering , vol.9 , Issue.4 , pp. 357-365
    • Kim, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.