메뉴 건너뛰기




Volumn , Issue , 2012, Pages 799-804

Enabling trust and privacy for RFID system

Author keywords

Anonymizer; Integrated RFID system; Integrity; Privacy; RFID; Security

Indexed keywords

ANONYMIZER; CONTACT LESS; FUTURE GENERATIONS; HYBRID TECHNIQUES; INTEGRATED SYSTEMS; INTEGRITY; INTEGRITY VERIFICATIONS; LOCATION PRIVACY; NEW TECHNOLOGIES; PRIVACY ANALYSIS; PRIVACY PRESERVING; RFID PROTOCOLS; RFID SYSTEMS; RFID TECHNOLOGY; SECURITY; TRUST ESTABLISHMENT; USER DATA;

EID: 84874344716     PISSN: 21647143     EISSN: 21647151     Source Type: Conference Proceeding    
DOI: 10.1109/ISDA.2012.6416639     Document Type: Conference Paper
Times cited : (2)

References (23)
  • 2
    • 2942532031 scopus 로고    scopus 로고
    • RFID tags: Big Brother in small packages
    • 13 January
    • D. McCullagh. RFID tags: Big Brother in small packages. CNet, 13 January 2003.
    • (2003) CNet
    • McCullagh, D.1
  • 3
    • 70349980888 scopus 로고    scopus 로고
    • Conductive Inkjet-Printed Antennas on Flexible Low-Cost Paper-Based Substrates for RFID and WSN Applications
    • Jun.
    • A. Rida, L. Yang, R. Vyas, and M. M. Tentzeris, "Conductive Inkjet-Printed Antennas on Flexible Low-Cost Paper-Based Substrates for RFID and WSN Applications," IEEE Antennas Propagat. Mag., vol. 51, no. 3, pp. 13-23, Jun. 2009.
    • (2009) IEEE Antennas Propagat. Mag. , vol.51 , Issue.3 , pp. 13-23
    • Rida, A.1    Yang, L.2    Vyas, R.3    Tentzeris, M.M.4
  • 4
    • 70349088651 scopus 로고    scopus 로고
    • Location Privacy in RFID Applications
    • C. Bettini, S. Jajodia, P. Samarati, X. S. Wang, (eds.) Privacy in Location-Based Applications, Springer, Heidelberg
    • A. R. Sadeghi, I. Visconti, C. Wachsmann, -"Location Privacy in RFID Applications," In: C. Bettini, S. Jajodia, P. Samarati, X. S. Wang, (eds.) Privacy in Location-Based Applications, volume 5599 of LNCS, Springer, Heidelberg, 2009, pp. 127-150.
    • (2009) LNCS , vol.5599 , pp. 127-150
    • Sadeghi, A.R.1    Visconti, I.2    Wachsmann, C.3
  • 5
    • 71549125572 scopus 로고    scopus 로고
    • Anonymizer-Enabled Security and Privacy for RFID
    • J. A. Garay, A. Miyaji, A. Otsuka (eds.) CANS 2009, Springer, Heidelberg
    • A. R. Sadeghi, I. Visconti, C. Wachsmann, -"Anonymizer-Enabled Security and Privacy for RFID," In: J. A. Garay, A. Miyaji, A. Otsuka (eds.) CANS 2009, volume 5888 of LNCS, Springer, Heidelberg, 2009, pp. 134-153.
    • (2009) LNCS , vol.5888 , pp. 134-153
    • Sadeghi, A.R.1    Visconti, I.2    Wachsmann, C.3
  • 7
    • 78650151843 scopus 로고    scopus 로고
    • On RFID Privacy with Mutual Authentication and Tag Corruption
    • Zhou, J. (ed.) ACNS 2010. Springer, Heidelberg
    • F. Armknecht, A. R. Sadeghi, I. Visconti, C. Waschmann, "On RFID Privacy with Mutual Authentication and Tag Corruption. In: Zhou, J. (ed.) ACNS 2010. LNCS, Vol. 6123, Springer, Heidelberg, 2010, pp. 493-510.
    • (2010) LNCS , vol.6123 , pp. 493-510
    • Armknecht, F.1    Sadeghi, A.R.2    Visconti, I.3    Waschmann, C.4
  • 8
    • 33749663423 scopus 로고    scopus 로고
    • RFID malware: Design principles and examples
    • Pervasive and Mobile Computing (November 2006), IEEE
    • M. R. Rieback, P. N. D. Simpson, B. Crispo and A. S. Tanenbaum, "RFID malware: Design principles and examples," In Pervasive and Mobile Computing In Special Issue on PerCom 2006, Vol. 2, No. 4. (November 2006), IEEE, 2006, pp.405-426.
    • (2006) PerCom 2006 , vol.2 , Issue.4 SPEC. ISSUE , pp. 405-426
    • Rieback, M.R.1    Simpson, P.N.D.2    Crispo, B.3    Tanenbaum, A.S.4
  • 9
    • 1942489982 scopus 로고    scopus 로고
    • Hacking techniques: The tools that hackers use, and how they are evolving to become sophisticated
    • R. Barber, "Hacking techniques: the tools that hackers use, and how they are evolving to become sophisticated", Computer Fraud and Security, Vol. 2001, Issue 3, 2001, pp. 9-12.
    • (2001) Computer Fraud and Security , vol.2001 , Issue.3 , pp. 9-12
    • Barber, R.1
  • 14
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security - ICICS' 06, Springer-Verlag, Raleigh, North Carolina, USA, December
    • C. Lim and T. Kwon, "Strong and robust RFID authentication enabling perfect ownership transfer." In P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security - ICICS' 06, LNCS, Vol. 4307, Springer-Verlag, Raleigh, North Carolina, USA, December 2006, pp. 1-20.
    • (2006) LNCS , vol.4307 , pp. 1-20
    • Lim, C.1    Kwon, T.2
  • 15
    • 21644486314 scopus 로고    scopus 로고
    • Trusted Computing Group August 2nd. Specification Revision 1.4
    • Trusted Computing Group (2007, August 2nd). TCG Specification Architecture Overview, Specification Revision 1.4.
    • (2007) TCG Specification Architecture Overview
  • 18
    • 38549157185 scopus 로고    scopus 로고
    • Trusted Computing - Special Aspects and Challenges
    • SOFSEM 2008, High Tetras, January Springer, Slovakia
    • A. Sadeghi, "Trusted Computing - Special Aspects and Challenges," SOFSEM 2008, High Tetras, volume 4910 of LNCS, January 2008, Springer, Slovakia, pp. 98-117.
    • (2008) LNCS , vol.4910 , pp. 98-117
    • Sadeghi, A.1
  • 20
    • 33748062337 scopus 로고    scopus 로고
    • PRIMA: Policy-Reduced Integrity Measurement Architecture
    • ACM Press
    • T. Jaeger, R. Sailer and U. Shankar, "PRIMA: Policy-Reduced Integrity Measurement Architecture," SACMAT '06, ACM Press, 2006, pp. 19-28.
    • (2006) SACMAT '06 , pp. 19-28
    • Jaeger, T.1    Sailer, R.2    Shankar, U.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.