메뉴 건너뛰기




Volumn 7, Issue 4, 2013, Pages 37-50

RFID mutual authentication protocol based on synchronized secret

Author keywords

Desynchronization attack; Privacy; Rfid; Rfid tag authentication; Security protocol

Indexed keywords

AUTHENTICATION PROTOCOLS; DE-SYNCHRONIZATION ATTACKS; MAN IN THE MIDDLE ATTACKS; MUTUAL AUTHENTICATION PROTOCOLS; RADIO-FREQUENCY-IDENTIFICATION TAGS (RFID); RF-ID TAGS; RFID MUTUAL AUTHENTICATION PROTOCOLS; SECURITY PROTOCOLS;

EID: 84883277181     PISSN: 17389976     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (29)
  • 2
    • 0004239952 scopus 로고    scopus 로고
    • RFID Handbook, second edition
    • Wiley & Sons
    • K. Finkenzeller, "RFID Handbook, second edition", Wiley & Sons, (2002).
    • (2002)
    • Finkenzeller, K.1
  • 3
    • 24644498485 scopus 로고    scopus 로고
    • RFID: a technical overview and its application to the enterprise
    • R. Weinstein, "RFID: a technical overview and its application to the enterprise", IT Professionals, vol. 7, (2005), pp. 27-33.
    • (2005) IT Professionals , vol.7 , pp. 27-33
    • Weinstein, R.1
  • 4
    • 34547367358 scopus 로고    scopus 로고
    • The pros and cons of RFID in supply chain management
    • K. Michael and L. McCathie, "The pros and cons of RFID in supply chain management", Proc. of ICMB'05, (2005), pp. 623-629.
    • (2005) Proc. of ICMB'05 , pp. 623-629
    • Michael, K.1    McCathie, L.2
  • 7
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: a research survey
    • A. Juels, "RFID security and privacy: a research survey", Selected Areas in Communications, vol. 24, no. 2, (2006), pp. 381-394.
    • (2006) Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 8
    • 33745761701 scopus 로고    scopus 로고
    • Scalable and flexible privacy protection scheme for RFID systems
    • S. Yeo and S. Kim, "Scalable and flexible privacy protection scheme for RFID systems", Lecture Notes in Computer Science, vol. 3813, (2005), pp. 153-163.
    • (2005) Lecture Notes in Computer Science , vol.3813 , pp. 153-163
    • Yeo, S.1    Kim, S.2
  • 17
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • S. A. Weis, S. E. Sarma, R. L. Rivest and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems", Security in Pervasive Computing, vol. 2802, (2003), pp. 201-212.
    • (2003) Security in Pervasive Computing , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 19
    • 38149050502 scopus 로고    scopus 로고
    • A family of dunces: trivial RFID identification and authentication protocols
    • G. Tsudik, "A family of dunces: trivial RFID identification and authentication protocols", Proc. of the Symposium on Privacy-Enhancing Technologies, (2007), pp. 45-61.
    • (2007) Proc. of the Symposium on Privacy-Enhancing Technologies , pp. 45-61
    • Tsudik, G.1
  • 20
    • 34547630116 scopus 로고    scopus 로고
    • Secure anonymous RFID authentication protocols
    • Florida State University
    • C. Chatmon, T. v. Le and M. Burmester, "Secure anonymous RFID authentication protocols", Technical Report TR-060112, Florida State University, (2006).
    • (2006) Technical Report TR-060112
    • Chatmon, C.1    Le, T.V.2    Burmester, M.3
  • 21
    • 84919847483 scopus 로고    scopus 로고
    • Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
    • doi:10.1016/j.camwa.2012.02.025
    • J. S. Cho, Y. S. Jeong and S. O. Park, "Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol", Computers and Mathematics with Applications. doi:10.1016/j.camwa.2012.02.025.
    • Computers and Mathematics with Applications
    • Cho, J.S.1    Jeong, Y.S.2    Park, S.O.3
  • 22
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • J. S. Cho, S. S. Yeo and S. K. Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value", Computer Communications, vol. 34, (2011), pp. 391-397.
    • (2011) Computer Communications , vol.34 , pp. 391-397
    • Cho, J.S.1    Yeo, S.S.2    Kim, S.K.3
  • 23
    • 84869754446 scopus 로고    scopus 로고
    • Enhanced hash-based RFID mutual authentication protocol
    • H. S. Kim, "Enhanced hash-based RFID mutual authentication protocol", Communications in Computer and Information Science, (2012), vol. 339, no. 5, pp. 70-77.
    • (2012) Communications in Computer and Information Science , vol.339 , Issue.5 , pp. 70-77
    • Kim, H.S.1
  • 26
    • 67650674080 scopus 로고    scopus 로고
    • A Survey of RFID Privacy approaches
    • M. Langheinrich, "A Survey of RFID Privacy approaches", Personal and Ubiquitous Computing, (2009), vol. 13, no. 6, pp. 413-421.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 413-421
    • Langheinrich, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.