메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

Untangling RFID privacy models

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET;

EID: 84900440005     PISSN: 20907141     EISSN: 2090715X     Source Type: Journal    
DOI: 10.1155/2013/710275     Document Type: Article
Times cited : (24)

References (44)
  • 1
    • 84907377571 scopus 로고    scopus 로고
    • EPCglobal. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1. 2. 0: Gen 2, 2008
    • EPCglobal. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1. 2. 0: Gen 2, 2008, http://www.epcglobalinc.org/standards/
  • 2
    • 84907357486 scopus 로고    scopus 로고
    • Contactless SLE 66 Family
    • Infineon,. Contactless SLE 66 Family, http://www.infineon.com/
    • Infineon1
  • 3
    • 84907337523 scopus 로고    scopus 로고
    • DESFire Tags
    • NXP Semiconductors,. DESFire Tags, http://www.nxp.com/
    • Semiconductors, N.1
  • 4
    • 84907337522 scopus 로고    scopus 로고
    • Privacy-by-Design
    • Cavoukian A.,. Privacy-by-Design, http://privacybydesign.ca/
    • Cavoukian, A.1
  • 9
    • 33744957484 scopus 로고    scopus 로고
    • Adversary model for radio frequency identification
    • Lausanne, Switzerland Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
    • Avoine G., Adversary model for radio frequency identification. LASEC-REPORT 2005 2005-001 Lausanne, Switzerland Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
    • (2005) LASEC-REPORT
    • Avoine, G.1
  • 10
    • 76849106311 scopus 로고    scopus 로고
    • Universally composable RFID identification and authentication protocols
    • ARTICLE 21 2-s2.0-76849106311 10.1145/1513601.1513603
    • Burmester M., van Le T., de Medeiros B., Tsudik G., Universally composable RFID identification and authentication protocols. ACM Transactions on Information and System Security 2009 12 4, article 21 2-s2.0-76849106311 10.1145/1513601.1513603
    • (2009) ACM Transactions on Information and System Security , vol.12 , Issue.4
    • Burmester, M.1    Van Le, T.2    De Medeiros, B.3    Tsudik, G.4
  • 33
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • 2-s2.0-0020720357 10.1109/TIT.1983.1056650
    • Dolev D., Yao A. C., On the security of public key protocols. IEEE Transactions on Information Theory 1983 29 2 198 208 2-s2.0-0020720357 10.1109/TIT.1983.1056650
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 34
    • 31844437820 scopus 로고    scopus 로고
    • ACM Workshop on Formal Methods in Security Engineering (FMSE '05) November 2005 Alexandria, VA, USA ACM 2-s2.0-31844437820
    • Garcia F. D., Hasuo I., Pieters W., van Rossum P., Provable anonymity. ACM Workshop on Formal Methods in Security Engineering (FMSE '05) November 2005 Alexandria, VA, USA ACM 63 72 2-s2.0-31844437820
    • Provable Anonymity , pp. 63-72
    • Garcia, F.D.1    Hasuo, I.2    Pieters, W.3    Van Rossum, P.4
  • 37
    • 84907377568 scopus 로고    scopus 로고
    • International Organization For Standardization ISO/IEC, 9798: Information technology - Security techniques - Entity authentication, 1991-2010
    • International Organization for Standardization,. ISO/IEC, 9798: Information technology-Security techniques-Entity authentication, 1991-2010
  • 41
    • 79952958289 scopus 로고    scopus 로고
    • Practical eavesdropping and skimming attacks on high-frequency RFID tokens
    • 2-s2.0-79952958289 10.3233/JCS-2010-0407
    • Hancke G. P., Practical eavesdropping and skimming attacks on high-frequency RFID tokens. Journal of Computer Security 2011 19 2 259 288 2-s2.0-79952958289 10.3233/JCS-2010-0407
    • (2011) Journal of Computer Security , vol.19 , Issue.2 , pp. 259-288
    • Hancke, G.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.