메뉴 건너뛰기




Volumn , Issue , 2012, Pages

The survey of RFID attacks and defenses

Author keywords

Encryption algorithm; RFID security and privacy; RFID system; Security protocol

Indexed keywords

COMPREHENSIVE ANALYSIS; ENCRYPTION ALGORITHMS; PERVASIVE COMPUTING TECHNOLOGY; RFID SECURITY; RFID SYSTEMS; SECURITY PROTOCOLS; SECURITY THREATS; TECHNICAL POTENTIAL;

EID: 84876026151     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WiCOM.2012.6478720     Document Type: Conference Paper
Times cited : (21)

References (15)
  • 1
    • 55649122502 scopus 로고    scopus 로고
    • A universally compostable secure RFID communication protocol in supply chains [M]
    • (in chinese)
    • Zhang Fan, Sun Xuan, A Universally Composable Secure RFID Comm unication Protocol in Supply Chains [M], China Journal of Computer, 2008, 31(10). (in chinese).
    • (2008) China Journal of Computer , vol.31 , Issue.10
    • Zhang, F.1    Sun, X.2
  • 2
    • 49049105769 scopus 로고    scopus 로고
    • Design and Implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications [C]
    • Las Vegas, NV, USA
    • Devadas S, Suh E, Paral. Design and Implementation of PUF-based "unclonable" RFID ICs for Anti-Counterfeiting and Security applications [C], Proceedings of the 2008 IEEE International Conference on RFID, Las Vegas, NV, USA, 2008:58-64.
    • (2008) Proceedings of the 2008 IEEE International Conference on RFID , pp. 58-64
    • Devadas, S.1    Suh, E.2    Paral3
  • 8
    • 84876027702 scopus 로고    scopus 로고
    • Some methods for privacy in RFID communication [C], Security in ad-hoc and sensor networks
    • Berlin, Heidelberg: Springer-Verlag
    • Fishkin K, Roy S, Jiang B. Some methods for privacy in RFID communication [C]. Security in Ad-hoc and Sensor Networks, Proceedings of the 1st European Workshop on Security (ESAS'04), Berlin, Heidelberg:Springer-Verlag, 2004:42-53.
    • (2004) Proceedings of the 1st European Workshop on Security (ESAS'04) , pp. 42-53
    • Fishkin, K.1    Roy, S.2    Jiang, B.3
  • 9
    • 84876021752 scopus 로고    scopus 로고
    • Time measurement threatens privacy-friendly RFID authentication protocols [C]
    • Istanbul, Turkey
    • Gildas Avoine, Iwen Coisel, Tania Martin. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols [C]. In Workshop on RFID Security(RFIDSec'10), Istanbul, Turkey, 2010.
    • (2010) Workshop on RFID Security (RFIDSec'10)
    • Gildas, A.1    Iwen, C.2    Tania, M.3
  • 12
    • 33744964854 scopus 로고    scopus 로고
    • Design and analysis of cryptograph IC protocols for RFID [M]
    • (in chinese)
    • Zhou Yong-Bin, Feng Deng-Guo, Design and Analysis of Cryptograph ic Protocols for RFID [M], China Journal of Computer, 2006, 29(4). (in chinese).
    • (2006) China Journal of Computer , vol.29 , Issue.4
    • Zhou, Y.-B.1    Feng, D.-G.2
  • 15
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultra lightweight RFID authentication protocol providing strong authentication and strong integrity [J]
    • H Y Chien. SASI:A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity [J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4):337-340.
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.