메뉴 건너뛰기




Volumn 8, Issue 3, 2013, Pages 605-612

Security protocol for RFID system conforming to EPC-C1G2 standard

Author keywords

EPC C1G2 standard; Privacy; RFID system; Security protocol

Indexed keywords

AUTHENTICATION PROTOCOLS; LOCATION PRIVACY; RESOURCECONSTRAINED DEVICES; RFID AUTHENTICATION PROTOCOLS; RFID SYSTEMS; SECURITY AND PERFORMANCE; SECURITY PROBLEMS; SECURITY PROTOCOLS;

EID: 84875171185     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.8.3.605-612     Document Type: Article
Times cited : (6)

References (17)
  • 1
    • 83455217353 scopus 로고    scopus 로고
    • Improvement of Filtering Algorithm for RFID Middleware Using KDB-tree Query Index
    • X. B Zhang, L. L Cheng, Q. M Zhu, "Improvement of Filtering Algorithm for RFID Middleware Using KDB-tree Query Index", Journal of Software, vol.6, No.12, pp2521-2527, 2011.
    • (2011) Journal of Software , vol.6 , Issue.12 , pp. 2521-2527
    • Zhang, X.B.1    Cheng, L.L.2    Zhu, Q.M.3
  • 3
    • 79951821097 scopus 로고    scopus 로고
    • Research on RFID Integration Middleware for Enterprise Information System
    • M. B Li, H. Li, "Research on RFID Integration Middleware for Enterprise Information System", Journal of Software, vol.6, No.2, pp167-174, 2011.
    • (2011) Journal of Software , vol.6 , Issue.2 , pp. 167-174
    • Li, M.B.1    Li, H.2
  • 4
    • 79960793886 scopus 로고    scopus 로고
    • The design and realization of a Lightweight RFID Mechanism Integrating Security and Anti-collision
    • S. S Yu, Y. Peng, J. Yang, J. J Zhang, "The design and realization of a Lightweight RFID Mechanism Integrating Security and Anti-collision", Journal of Software, vol.6, No.7, pp1235-1240, 2011.
    • (2011) Journal of Software , vol.6 , Issue.7 , pp. 1235-1240
    • Yu, S.S.1    Peng, Y.2    Yang, J.3    Zhang, J.J.4
  • 5
    • 84860330702 scopus 로고    scopus 로고
    • A Novel Method for Modeling RFID Data
    • K. Bai, S. X Li, T. Liu, J. Tian, "A Novel Method for Modeling RFID Data", Journal of Software, vol.7, No.4, pp835-843, 2012.
    • (2012) Journal of Software , vol.7 , Issue.4 , pp. 835-843
    • Bai, K.1    Li, S.X.2    Liu, T.3    Tian, J.4
  • 7
    • 85008055668 scopus 로고    scopus 로고
    • Secure and serverless RFID authentication and search protocols
    • CC. Tan, B. Sheng and Q. Li, "Secure and serverless RFID authentication and search protocols", IEEE Transtracitons on Wireless Communications, vol.7, No.4, pp1400-1407, 2008.
    • (2008) IEEE Transtracitons on Wireless Communications , vol.7 , Issue.4 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3
  • 8
    • 38149049144 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
    • S. Han, V. Potgar and E. Chang, "Mutual authentication protocol for RFID tags based on synchronized secret information with monitor", Proceedings of ICCSA, Lecture Notes in Computer Science, vol.4707, pp227-238,2007.
    • (2007) Proceedings of ICCSA, Lecture Notes in Computer Science , vol.4707 , pp. 27-238
    • Han, S.1    Potgar, V.2    Chang, E.3
  • 9
    • 38149094945 scopus 로고    scopus 로고
    • A Study on low-cost RFID system management with mutual authentication scheme in ubiquitous
    • S.Y. Kang and I.Y. Lee, "A Study on low-cost RFID system management with mutual authentication scheme in ubiquitous", Proceedings of APNOMS, Lecture Notes in Computer Science, vol.4773, pp. 492-502, 2007.
    • (2007) Proceedings of APNOMS, Lecture Notes in Computer Science , vol.4773 , pp. 492-502
    • Kang, S.Y.1    Lee, I.Y.2
  • 11
    • 83455199100 scopus 로고    scopus 로고
    • An Improved RFID Localization Algorithm Based on Layer By Layer Exclusion
    • H. T Zhang and P Miao, "An Improved RFID Localization Algorithm Based on Layer By Layer Exclusion", Journal of Computers, vol. 6, No 12, pp.2734-2739, 2011.
    • (2011) Journal of Computers , vol.6 , Issue.12 , pp. 2734-2739
    • Zhang, H.T.1    Miao, P.2
  • 12
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • H. Y. Chien and C. H. Chen, "Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards", Computer Standards and Interfaces, vol.29, No.2, pp. 254-259,2007.
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 13
  • 14
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection
    • C. L. Chen and Y.Y. Deng, "Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection", Engineering Applications of Artificial Intelligence, vol.22, No.8, pp.1284-1291,2009.
    • (2009) Engineering Applications of Artificial Intelligence , vol.22 , Issue.8 , pp. 1284-1291
    • Chen, C.L.1    Deng, Y.Y.2
  • 16
    • 77957851534 scopus 로고    scopus 로고
    • Securing RFID systems conforming to EPC Class 1 Generation 2 standard
    • T. C. Yeh, Y. J Wang, T. C. Kuo and S. S. Wang, " Securing RFID systems conforming to EPC Class 1 Generation 2 standard", Expert Systems with Applications, vol.37, No 12, pp. 7678-7683, 2011.
    • (2011) Expert Systems with Applications , vol.37 , Issue.12 , pp. 7678-7683
    • Yeh, T.C.1    Wang, Y.J.2    Kuo, T.C.3    Wang, S.S.4
  • 17
    • 81855161588 scopus 로고    scopus 로고
    • Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard
    • E.-J. Yoon. "Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard". Expert Systems with Applications, vol.39, No1, pp. 1589-1594,2012.
    • (2012) Expert Systems with Applications , vol.39 , Issue.1 , pp. 1589-1594
    • Yoon, E.-J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.