메뉴 건너뛰기




Volumn 8, Issue , 2012, Pages 33-44

A RFID path-checking protocol based on ordered multisignatures

Author keywords

Authentication; Ordered multisignatures; Path checking; Privacy; RFID

Indexed keywords

AUTHENTICATION; DATA PRIVACY; NUMBER THEORY; RANDOM NUMBER GENERATION; SUPPLY CHAIN MANAGEMENT;

EID: 84888188818     PISSN: 18716431     EISSN: 18798101     Source Type: Book Series    
DOI: 10.3233/978-1-61499-143-4-33     Document Type: Conference Paper
Times cited : (3)

References (22)
  • 2
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2) (February 2006) 381-394 (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 3
    • 2942556410 scopus 로고    scopus 로고
    • Radio-frequency identification: Security risks and challenges
    • (Spring)
    • Sarma, S., Weis, S., Engels, D.: Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes, RSA Laboratories 6(1) (Spring 2003) 2-9
    • (2003) Cryptobytes, RSA Laboratories , vol.6 , Issue.1 , pp. 2-9
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 5
    • 24944582157 scopus 로고    scopus 로고
    • Efficient authentication for low-cost RFID systems
    • Computational Science and Its Applications - ICCSA 2005: International Conference, Proceeedings
    • Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.L.: Efficient Authentication for Low-Cost RFID Systems. In Gervasi, O., Gavrilova, M., Kumar, V., Laganàa, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K., eds.: International Conference on Computational Science and its Applications - ICCSA 2005, Proceedings, Part I. Volume 3480 of Lecture Notes in Computer Science., Singapore, Republic of Singapore, Springer (May 2005) 619-627 (Pubitemid 41313878)
    • (2005) Lecture Notes in Computer Science , vol.3480 , Issue.I , pp. 619-627
    • Lee, S.M.1    Hwang, Y.J.2    Lee, D.H.3    Lim, J.I.4
  • 6
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • Advances in Cryptology - ASIACRYPT 2001
    • Hopper, N.J., Blum, M.: Secure human identification protocols. In: ASIACRYPT. (2001) 52-66 (Pubitemid 33371178)
    • (2002) Lecture Notes in Computer Science , Issue.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 7
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • In Shoup, V., ed.: Santa Barbara, California, USA, IACR, Springer (August)
    • Juels, A., Weis, S.: Authenticating Pervasive Devices with Human Protocols. In Shoup, V., ed.: Advances in Cryptology - CRYPTO'05. Volume 3126 of Lecture Notes in Computer Science., Santa Barbara, California, USA, IACR, Springer (August 2005) 293-308
    • (2005) Advances in Cryptology - CRYPTO'05. Volume 3126 of Lecture Notes in Computer Science , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 9
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to "privacy-friendly" tags
    • In: MIT, Massachusetts, USA (November)
    • Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to "Privacy-Friendly" Tags. In: RFID Privacy Workshop, MIT, Massachusetts, USA (November 2003)
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 11
    • 80052658754 scopus 로고    scopus 로고
    • Low cost rfid authentication protocol with forward privacy
    • Chang-She, M.: Low cost rfid authentication protocol with forward privacy. Chinese Journal of Computers 34(8) (2011)
    • (2011) Chinese Journal of Computers , vol.34 , Issue.8
    • Chang-She, M.1
  • 12
    • 85180623483 scopus 로고    scopus 로고
    • Tracker: Security and privacy for rfid-based supply chains
    • Blass, E.O., Elkhiyaoui, K., Molva, R.: Tracker: Security and privacy for rfid-based supply chains. In: NDSS. (2011)
    • (2011) NDSS
    • Blass, E.O.1    Elkhiyaoui, K.2    Molva, R.3
  • 13
    • 84860657792 scopus 로고    scopus 로고
    • Checker: On-site checking in rfid-based supply chains
    • Elkhiyaoui, K., Blass, E.O., Molva, R.: Checker: on-site checking in rfid-based supply chains. In: WISEC. (2012) 173-184
    • (2012) WISEC , pp. 173-184
    • Elkhiyaoui, K.1    Blass, E.O.2    Molva, R.3
  • 14
    • 0032069741 scopus 로고    scopus 로고
    • Signature-based method for run-time fault detection in communication protocols
    • PII S0140366498001212
    • Noubir, G., Vijayananda, K., Nussbaumer, H.J.: Signature-based method for run-time fault detection in communication protocols. Computer Communications 21(5) (1998) 405-421 (Pubitemid 128393709)
    • (1998) Computer Communications , vol.21 , Issue.5 , pp. 405-421
    • Noubir, G.1    Vijayananda, K.2    Nussbaumer, H.J.3
  • 15
  • 16
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: EUROCRYPT. (2003) 416-432
    • (2003) EUROCRYPT , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 17
    • 38149040922 scopus 로고    scopus 로고
    • Unrestricted aggregate signatures
    • Bellare, M., Namprempre, C., Neven, G.: Unrestricted aggregate signatures. In: ICALP. (2007) 411-422
    • (2007) ICALP , pp. 411-422
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 19
    • 35048877778 scopus 로고    scopus 로고
    • Sequential aggregate signatures from trapdoor permutations
    • Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: EUROCRYPT. (2004) 74-90
    • (2004) EUROCRYPT , pp. 74-90
    • Lysyanskaya, A.1    Micali, S.2    Reyzin, L.3    Shacham, H.4
  • 21
    • 0024104968 scopus 로고
    • A digital multisignature schema using bijective public-key cryptosystems
    • Okamoto, T.: A digital multisignature schema using bijective public-key cryptosystems. ACM Trans. Comput. Syst. 6(4) (1988) 432-441
    • (1988) ACM Trans. Comput. Syst. , vol.6 , Issue.4 , pp. 432-441
    • Okamoto, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.