메뉴 건너뛰기




Volumn 334 CCIS, Issue , 2013, Pages 458-466

Analysis and construction of efficient RFID authentication protocol with backward privacy

Author keywords

Backward Privacy; Elliptic Curve Cryptography (ECC); Mutual Authentication; RFID

Indexed keywords

AUTHENTICATION; WIRELESS SENSOR NETWORKS;

EID: 84873981263     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-36252-1_43     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 1
    • 35048859848 scopus 로고    scopus 로고
    • Strong Authentication for RFID Systems Using the AES Algorithm
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357-370. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 2
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 3
    • 27644472569 scopus 로고    scopus 로고
    • An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
    • Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB+ - a Provably Secure Lightweight Authentication Protocol. IET Electronic Letters 41(21), 1169-1170 (2005)
    • (2005) IET Electronic Letters , vol.41 , Issue.21 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 5
    • 51349120734 scopus 로고    scopus 로고
    • Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks
    • Bringer, J., Chabanne, H.: Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory 54(9), 4339-4342 (2008)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.9 , pp. 4339-4342
    • Bringer, J.1    Chabanne, H.2
  • 6
    • 54249085502 scopus 로고    scopus 로고
    • + Are Hard to Find
    • Tsudik, G. (ed.) FC 2008. Springer, Heidelberg
    • + Are Hard to Find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 156-170. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5143 , pp. 156-170
    • Gilbert, H.1    Robshaw, M.2    Seurin, Y.3
  • 8
    • 34547687590 scopus 로고    scopus 로고
    • Defining strong privacy for RFID
    • IEEE Computer Society
    • Juels, A., Weis, S.A.: Defining strong privacy for RFID. In: PERCOMW, pp. 342-347. IEEE Computer Society (2007)
    • (2007) PERCOMW , pp. 342-347
    • Juels, A.1    Weis, S.A.2
  • 9
    • 34748848124 scopus 로고    scopus 로고
    • Universally composable and forward-secure RFID authentication and authenticated key exchange
    • ACM
    • Le, T.V., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: ASIACCS 2007, pp. 242-252. ACM (2007)
    • (2007) ASIACCS 2007 , pp. 242-252
    • Le, T.V.1    Burmester, M.2    De Medeiros, B.3
  • 10
    • 38149038702 scopus 로고    scopus 로고
    • On Privacy Models for RFID
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 12
    • 70350639755 scopus 로고    scopus 로고
    • ECC Is Ready for RFID - A Proof in Silicon
    • Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
    • Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID - A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 401-413. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5381 , pp. 401-413
    • Hein, D.1    Wolkerstorfer, J.2    Felber, N.3
  • 14
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP based Randomized Access Control): Provably Secure RFID Authentication Protocol
    • IEEE
    • Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based Randomized Access Control): Provably Secure RFID Authentication Protocol. In: IEEE International Conference on RFID 2008, pp. 97-104. IEEE (2008)
    • (2008) IEEE International Conference on RFID 2008 , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 15
    • 58449108568 scopus 로고    scopus 로고
    • Cryptanalysis of EC-RAC, a RFID Identification Protocol
    • Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
    • Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149-161. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5339 , pp. 149-161
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 16
    • 78650089685 scopus 로고    scopus 로고
    • EC-RAC: Enriching a Capacious RFID Attack Collection
    • Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
    • van Deursen, T., Radomirović, S.: EC-RAC: Enriching a Capacious RFID Attack Collection. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 75-90. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6370 , pp. 75-90
    • Van Deursen, T.1    Radomirović, S.2
  • 17
    • 78650082766 scopus 로고    scopus 로고
    • On the Claimed Privacy of EC-RAC III
    • Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
    • Fan, J., Hermans, J., Vercauteren, F.: On the Claimed Privacy of EC-RAC III. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 66-74. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6370 , pp. 66-74
    • Fan, J.1    Hermans, J.2    Vercauteren, F.3
  • 19
    • 76749128991 scopus 로고    scopus 로고
    • Efficient zero-knowledge identification schemes which respect privacy
    • Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS, pp. 195-205 (2009)
    • (2009) Proceedings of ASIACCS , pp. 195-205
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 20
    • 33749561582 scopus 로고    scopus 로고
    • On the fly authentication and signature schemes based on groups of unknown order
    • Girault, M., Poupard, G., Stern, J.: On the fly authentication and signature schemes based on groups of unknown order. J. Cryptology 19(4), 463-487 (2006)
    • (2006) J. Cryptology , vol.19 , Issue.4 , pp. 463-487
    • Girault, M.1    Poupard, G.2    Stern, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.