메뉴 건너뛰기




Volumn , Issue , 2012, Pages

High-efficient RFID authentication protocol based on physical unclonable function

Author keywords

Authentication protocol; Linear feedback shift register; Physical unclonable functions; Radio frequency identification

Indexed keywords

AUTHENTICATION PROTOCOLS; EAVESDROPPING ATTACKS; LINEAR FEEDBACK SHIFT REGISTERS; OBJECT IDENTIFICATION; PHYSICAL UNCLONABLE FUNCTIONS; PHYSICAL UNCLONABLE FUNCTIONS (PUF); RFID AUTHENTICATION PROTOCOLS; SECURITY AUTHENTICATION;

EID: 84876060046     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WiCOM.2012.6478536     Document Type: Conference Paper
Times cited : (5)

References (10)
  • 1
    • 30344469114 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human pr otocols[J]
    • Juels A, Weis S A. Authenticating Pervasive Devices with Human Pr otocols[J].Advances in Cryptology, 2005, 6(3):293-308.
    • (2005) Advances in Cryptology , vol.6 , Issue.3 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 2
    • 84876047238 scopus 로고    scopus 로고
    • RFID security protocol design and analysis [J]
    • Zhou Yongbin, Deng-Guo Feng. RFID security protocol design and analysis [J]. Computer Science. 2006, 29 (4) :581-58.
    • (2006) Computer Science , vol.29 , Issue.4 , pp. 581-658
    • Yongbin, Z.1    Feng, D.-G.2
  • 4
    • 65349109748 scopus 로고    scopus 로고
    • Bo. hash function based authentication protocol for RFID security research [J]
    • DING Zhen-hua, Li Jintao, Bo. Hash function based authentication protocol for RFID security research [J]. Computer Research and Development, 2009, 46 (4) :583-592.
    • (2009) Computer Research and Development , vol.46 , Issue.4 , pp. 583-592
    • Zhen-Hua, D.I.N.G.1    Jintao, L.2
  • 5
    • 36248982045 scopus 로고    scopus 로고
    • A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity[J]
    • Chien H Y. SASI:A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4):337-340.
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Sasi, C.H.Y.1
  • 6
    • 84876053910 scopus 로고    scopus 로고
    • Universal hashing for ultra-low-power cryptographic hardware applications[D]
    • American
    • Yüksel K. Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications[D]. Worcester: Dept. of Electronical Engineering, WPI, 2004(in American).
    • (2004) Worcester: Dept. of Electronical Engineering, WPI
    • Yüksel, K.1
  • 8
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation[C]
    • San Diego, California, USA:[s.n]
    • Suh G E, Devadas D.Physical Unclonable Functions for Device Authentication and Secret Key Generation[C]//Proc. of Design Automation Conference.San Diego, California, USA:[s.n], 2007:9-14.
    • (2007) Proc. of Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.