메뉴 건너뛰기




Volumn 8, Issue 2, 2013, Pages 390-401

Secure RFID tag ownership transfer based on quadratic residues

Author keywords

Data security; Privacy; RFID tags

Indexed keywords

CLOSED LOOPS; COMPUTATIONAL CONSTRAINTS; DESYNCHRONIZATION; FORWARD SECRECY; IMPERSONATION ATTACK; LOCATION PRIVACY; OPEN-LOOP SCHEME; PASSIVE RFID; PERFORMANCE COMPARISON; QUADRATIC RESIDUES; RF-ID TAGS; RFID SYSTEMS; SECURE RFID; SECURITY ANALYSIS; SECURITY PROPERTIES; TRANSFER SCHEME; UNTRACEABILITY;

EID: 84872713391     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2235834     Document Type: Article
Times cited : (52)

References (33)
  • 8
    • 54049143316 scopus 로고    scopus 로고
    • Elliptic curve based security processor for RFID
    • Nov
    • Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic curve based security processor for RFID," IEEE Trans. Computers, vol. 57, no. 11, pp. 1514-1527, Nov. 2008.
    • (2008) IEEE Trans. Computers , vol.57 , Issue.11 , pp. 1514-1527
    • Lee, Y.K.1    Sakiyama, K.2    Batina, L.3    Verbauwhede, I.4
  • 9
    • 70449579747 scopus 로고    scopus 로고
    • Anonymous RFID authentication supporting constant key-lookup against active adversaries
    • Nov
    • M. Burmester, B. de Medeiros, and R. Motta, "Anonymous RFID authentication supporting constant key-lookup against active adversaries," Int. J. Appl. Cryptography, vol. 1, no. 2, pp. 79-90, Nov. 2008.
    • (2008) Int. J. Appl. Cryptography , vol.1 , Issue.2 , pp. 79-90
    • Burmester, M.1    De Medeiros, B.2    Motta, R.3
  • 10
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Aug
    • Y. Chen, J.-S. Chou, and H.-M. Sun, "A novel mutual authentication scheme based on quadratic residues for RFID systems," Comput. Netw., vol. 52, no. 12, pp. 2373-2380, Aug. 2008.
    • (2008) Comput. Netw. , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1    Chou, J.-S.2    Sun, H.-M.3
  • 11
    • 80052599286 scopus 로고    scopus 로고
    • Across-authority lightweight ownership transfer protocol
    • Aug.
    • M. H. Yang, "Across-authority lightweight ownership transfer protocol," Electronic Commerce Res. Applicat., vol. 10, no. 4, pp. 375-383, Aug. 2011.
    • (2011) Electronic Commerce Res. Applicat. , vol.10 , Issue.4 , pp. 375-383
    • Yang, M.H.1
  • 14
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • Apr.
    • B. Song and C. J. Mitchell, "Scalable RFID security protocols supporting tag ownership transfer," Comput. Commun., vol. 34, no. 4, pp. 556-566, Apr. 2011.
    • (2011) Comput. Commun. , vol.34 , Issue.4 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 15
    • 59249097693 scopus 로고    scopus 로고
    • A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
    • Nov
    • S. Fouladgar and H. Afifi, "A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags," J. Commun., vol. 2, no. 6, pp. 6-13, Nov. 2007.
    • (2007) J. Commun. , vol.2 , Issue.6 , pp. 6-13
    • Fouladgar, S.1    Afifi, H.2
  • 17
    • 70450162483 scopus 로고    scopus 로고
    • A new RFID authentication protocol with ownership transfer in an insecure communication environment
    • Aug.
    • C.-H. Wang and S. Chin, "A new RFID authentication protocol with ownership transfer in an insecure communication environment," in Proc. 9th Int. Conf. Hybrid Intelligent Systems, Aug. 2009, pp. 486-491.
    • (2009) Proc. 9th Int. Conf. Hybrid Intelligent Systems , pp. 486-491
    • Wang, C.-H.1    Chin, S.2
  • 18
    • 77949415170 scopus 로고    scopus 로고
    • Vulnerabilities in some recently proposed RFID ownership transfer protocols
    • Mar.
    • G. Kapoor and S. Piramuthu, "Vulnerabilities in some recently proposed RFID ownership transfer protocols," IEEE Commun. Lett., vol. 14, no. 3, pp. 260-262, Mar. 2010.
    • (2010) IEEE Commun. Lett. , vol.14 , Issue.3 , pp. 260-262
    • Kapoor, G.1    Piramuthu, S.2
  • 21
    • 77953303552 scopus 로고    scopus 로고
    • Lighweight mutual authentication and ownership transfer for RFID systems
    • Mar.
    • L. Kuseng, Z. Yu, Y. Wei, and Y. Guan, "Lighweight mutual authentication and ownership transfer for RFID systems," in Proc. IEEE INFOCOM 2010, Mar. 2010, pp. 1-5.
    • (2010) Proc. IEEE INFOCOM 2010 , pp. 1-5
    • Kuseng, L.1    Yu, Z.2    Wei, Y.3    Guan, Y.4
  • 23
    • 50249161524 scopus 로고    scopus 로고
    • SQUASH - AnewMACwith provable security properties for highly constrained devices such as RFID tags
    • A. Shamir, "SQUASH - AnewMACwith provable security properties for highly constrained devices such as RFID tags," Fast Software Encryption, Lecture Notes in Computer Science, vol. 5086, pp. 144-157, 2008.
    • (2008) Fast Software Encryption, Lecture Notes in Computer Science , vol.5086 , pp. 144-157
    • Shamir, A.1
  • 28
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash based RFID mutual authenication protocol using a secret value
    • Mar.
    • J.-S. Cho, S.-S. Yeo, and S.-K. Kim, "Securing against brute-force attack: A hash based RFID mutual authenication protocol using a secret value," Comput. Commun., vol. 34, no. 3, pp. 391-397, Mar. 2011.
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 391-397
    • Cho, J.-S.1    Yeo, S.-S.2    Kim, S.-K.3
  • 29
    • 84872734396 scopus 로고    scopus 로고
    • Airbus signs contract for high-memory RFID tags
    • Jan., [Online]
    • R.Wessel, "Airbus signs contract for high-memory RFID tags," RFID J., Jan. 2010 [Online]. Available: http://www.rfidjournal.com/article/ view/7323
    • (2010) RFID J.
    • Wessel, R.1
  • 30
    • 84865710579 scopus 로고    scopus 로고
    • Large memory RFID system solutions
    • [Online]
    • D. Dressen, "Large memory RFID system solutions," ATMEL Applicat. J., pp. 48-49 [Online]. Available: http://www.atmel.com/dyn/ resources/Prod documents/secrerf-largemem-3-04.pdf
    • ATMEL Applicat. J. , pp. 48-49
    • Dressen, D.1
  • 31
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • DOI 10.1007/s00145-001-0009-4
    • A. K. Lenstra and E. R. Verheul, "Selecting cryptographic key sizes," J. Cryptology, vol. 14, no. 4, pp. 255-293, Jan. 2001. (Pubitemid 33770276)
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 33
    • 68849120029 scopus 로고    scopus 로고
    • ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    • Oct
    • H.-Y. Chien and C.-S. Laih, "ECC-based lightweight authentication protocol with untraceability for low-cost RFID," J. Parallel Distrib. Comput., vol. 69, no. 10, pp. 848-853, Oct. 2009.
    • (2009) J. Parallel Distrib. Comput. , vol.69 , Issue.10 , pp. 848-853
    • Chien, H.-Y.1    Laih, C.-S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.