메뉴 건너뛰기




Volumn 17, Issue 5, 2012, Pages 521-536

A designated query protocol for serverless mobile RFID systems with reader and tag privacy

Author keywords

Designated query protocol; Encryption based; Radio Frequency IDentification (RFID); Reader privacy; Serverless

Indexed keywords

ADVERSARY MODELS; BACK-END SERVERS; ENCRYPTION-BASED; FORGERY ATTACKS; MOBILE READERS; MOBILE RFID; SERVERLESS; SYSTEM MODELS;

EID: 84876481081     PISSN: 10070214     EISSN: None     Source Type: Journal    
DOI: 10.1109/TST.2012.6314529     Document Type: Article
Times cited : (12)

References (20)
  • 2
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • DOI 10.1109/TDSC.2007.70226
    • Chien H-Y. SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340. (Pubitemid 350125898)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 4
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Juels A, Weis S A. Authenticating pervasive devices with human protocols. Lecture Notes in Computer Science, 2005, 3126: 293-308.
    • (2005) Lecture Notes in Computer Science , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 6
    • 34548814766 scopus 로고    scopus 로고
    • Strong crypto for RFID tags - A comparison of low-power hardware implementations
    • 4253019, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
    • Feldhofer M,Wolkerstorfer J. Strong crypto for RFID tags- A comparison of low-power hardware implementations. In: Proceedings of IEEE International Symposium on Circuits and Systems, 2007: 1839-1842. (Pubitemid 47448889)
    • (2007) Proceedings - IEEE International Symposium on Circuits and Systems , pp. 1839-1842
    • Feldhofer, M.1    Wolkerstorfer, J.2
  • 7
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Weis S, Sarma S, Rivest R, Engels D. Security and privacy aspects of low-cost radio frequency identification systems. Lecture Notes in Computer Science, 2004, 2802: 201-212.
    • (2004) Lecture Notes in Computer Science , vol.2802 , pp. 201-212
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 14
    • 67649484364 scopus 로고    scopus 로고
    • A Gen2-based RFID authentication protocol for security and privacy
    • Sun H, Ting W. A Gen2-based RFID authentication protocol for security and privacy. IEEE Transactions on Mobile Computing, 2009, 8(8): 1052-1062.
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , Issue.8 , pp. 1052-1062
    • Sun, H.1    Ting, W.2
  • 16
    • 85008055668 scopus 로고    scopus 로고
    • Secure and serverless RFID authentication and search protocols
    • Tan C C, Sheng B, Li Q. Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 2008, 7(3): 1400-1407.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.3 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3
  • 18
    • 63149152263 scopus 로고    scopus 로고
    • Strong authentication protocol for secure RFID tag search without help of central database
    • Won T, Chun J, Lee D. Strong authentication protocol for secure RFID tag search without help of central database. In: Proceedings of Embedded and Ubiquitous Computing, 2008, 2: 153-158.
    • (2008) Proceedings of Embedded and Ubiquitous Computing , vol.2 , pp. 153-158
    • Won, T.1    Chun, J.2    Lee, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.