메뉴 건너뛰기




Volumn 23, Issue 7, 2012, Pages 618-624

Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY;

EID: 84872290581     PISSN: 1124318X     EISSN: 15418251     Source Type: Journal    
DOI: 10.1002/ett.2514     Document Type: Article
Times cited : (25)

References (26)
  • 1
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 2006; 24(2): 381-394. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 2
    • 33847282484 scopus 로고    scopus 로고
    • A pull-based service replication protocol in mobile ad hoc networks
    • DOI 10.1002/ett.1080
    • Derhab A, Badache N. A pull-based service replication protocol in mobile ad hoc networks. European Transactions on Telecommunications 2007; 18(1): 1-11. DOI: 10.1002/ett.1080. URL http://dx.doi.org/10.1002/ett.1080. (Pubitemid 46325386)
    • (2007) European Transactions on Telecommunications , vol.18 , Issue.1 , pp. 1-11
    • Derhab, A.1    Badache, N.2
  • 4
    • 76649102405 scopus 로고    scopus 로고
    • Analytical modelling of users' behaviour and performance metrics in key distribution schemes
    • DOI: 10.1002/ett.1389
    • Tornatore M, Giacomazzi P. Analytical modelling of users' behaviour and performance metrics in key distribution schemes. European Transactions on Telecommunications 2010; 21(1): 1-12. DOI: 10.1002/ett.1389. URL http://dx.doi.org/10.1002/ett.1389.
    • (2010) European Transactions on Telecommunications , vol.21 , Issue.1 , pp. 1-12
    • Tornatore, M.1    Giacomazzi, P.2
  • 5
    • 79953899288 scopus 로고    scopus 로고
    • On the security of an enhanced UMTS authentication and key agreement protocol
    • DOI: 10.1002/ett.1460
    • Hwang MS, Chong SK, Ou HH. On the security of an enhanced UMTS authentication and key agreement protocol. European Transactions on Telecommunications 2011; 22(3): 99-112. DOI: 10.1002/ett.1460. URL http://dx.doi.org/10.1002/ett.1460.
    • (2011) European Transactions on Telecommunications , vol.22 , Issue.3 , pp. 99-112
    • Hwang, M.S.1    Chong, S.K.2    Ou, H.H.3
  • 9
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
    • IEEE: Las Vegas, NA, USA
    • Lee YK, Batina L, Verbauwhede I. EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In IEEE International Conference on RFID 2008. IEEE: Las Vegas,NA,USA, 2008; 97-104.
    • (2008) IEEE International Conference on RFID 2008 , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 10
    • 58449108568 scopus 로고    scopus 로고
    • Cryptanalysis of EC-RAC, a RFID identification protocol
    • Franklin MK, Hui LCK, Wong DS (eds), Lecture Notes in Computer Science. Springer: Hong Kong, China
    • Bringer J, Chabanne H, Icart T. Cryptanalysis of EC-RAC, a RFID identification protocol. In 7th International Conference on Cryptology And Network Security - CANS'08, Vol. 5339, Franklin MK, Hui LCK, Wong DS (eds), Lecture Notes in Computer Science. Springer: Hong Kong, China, 2008; 149-161.
    • (2008) 7th International Conference on Cryptology and Network Security - CANS'08 , vol.5339 , pp. 149-161
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 13
  • 14
    • 84872326702 scopus 로고    scopus 로고
    • Privacy challenges in RFID systems
    • Giusto D, Iera A, Morabito G, Atzori L (eds): Springer New York
    • Lee YK, Batina L, Verbauwhede I. Privacy challenges in RFID systems. In The Internet of Things, Giusto D, Iera A, Morabito G, Atzori L (eds): Springer New York, 2010; 397-407.
    • (2010) The Internet of Things , pp. 397-407
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 18
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg
    • Vaudenay S. On privacy models for RFID. In Advances in Cryptology - Asiacrypt 2007, Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg, 2007; 68-87.
    • (2007) Advances in Cryptology - Asiacrypt 2007 , pp. 68-87
    • Vaudenay, S.1
  • 20
    • 70349118926 scopus 로고    scopus 로고
    • Mutual authentication in RFID: Security and privacy
    • ACM Press: Tokyo, Japan
    • Paise RI, Vaudenay S. Mutual authentication in RFID: security and privacy. In ASIACCS'08. ACM Press: Tokyo, Japan, 2008; 292-299.
    • (2008) ASIACCS'08 , pp. 292-299
    • Paise, R.I.1    Vaudenay, S.2
  • 26
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocolłSASI
    • Phan RCW. Cryptanalysis of a new ultralightweight RFID authentication protocolłSASI. IEEE Transactions on Dependable and Secure Computing 2009; 6(4): 316-320.
    • (2009) IEEE Transactions on Dependable and Secure Computing , vol.6 , Issue.4 , pp. 316-320
    • Phan, R.C.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.