메뉴 건너뛰기




Volumn 32, Issue , 2014, Pages 198-206

An elliptic curve-based mutual authentication scheme for RFID implant systems

Author keywords

Authentication and identification; Elliptic curve cryptography; Healthcare; IoT; RFID implant system; Security

Indexed keywords

AUTHENTICATION; ELEMENTARY PARTICLES; ENERGY CONSERVATION; GEOMETRY; HEALTH CARE; PUBLIC KEY CRYPTOGRAPHY;

EID: 84902688982     PISSN: 18770509     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.procs.2014.05.415     Document Type: Conference Paper
Times cited : (38)

References (20)
  • 2
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification (rfid)
    • DOI 10.1016/j.cose.2005.12.003, PII S016740480500204X
    • C. Roberts. Radio frequency identification (RFID). Journal of Computers and Security, 25:18-26, 2006. (Pubitemid 43227228)
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 18-26
    • Roberts, C.M.1
  • 5
    • 33745654539 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting
    • Springer Verlag
    • P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In Topics in Cryptology, pages 115-131. Springer Verlag, 2006.
    • (2006) Topics in Cryptology , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 8
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
    • IEEE International Conference on
    • K. Yong, L. Batina, and I. Verbauwhede. EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol. In RFID, 2008 IEEE International Conference on, pages 97-104, 2008.
    • (2008) RFID 2008 , pp. 97-104
    • Yong, K.1    Batina, L.2    Verbauwhede., I.3
  • 9
    • 84902666519 scopus 로고    scopus 로고
    • A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol
    • Yi-Pin Liao and Chih-Ming Hsiao. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 2013.
    • (2013) Ad Hoc Networks
    • Liao, Y.1    Hsiao, C.2
  • 13
    • 0017930809 scopus 로고
    • METHOD for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Journal of Association for Computing Machinery, 21(2):120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 14
    • 78650114205 scopus 로고    scopus 로고
    • A lightweight implementation of keccak hash function for radio-frequency identification applications
    • E. Kavun and T. Yalcin. A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. In Radio Frequency Identification: Security and Privacy Issues, volume 6370, pages 258-269, 2010.
    • (2010) Radio Frequency Identification: Security and Privacy Issues , vol.6370 , pp. 258-269
    • Kavun, E.1    Yalcin, T.2
  • 17
    • 82155181956 scopus 로고    scopus 로고
    • Elliptic curve cryptography based authentication protocol for low-cost rfid tags
    • IEEE International Conference on
    • G. Godor and S. Imre. Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In RFID-Technologies and Applications (RFID-TA), 2011 IEEE International Conference on, pages 386-393, 2011.
    • (2011) RFID-Technologies and Applications (RFID-TA) 2011 , pp. 386-393
    • Godor, G.1    Imre, S.2
  • 18
  • 19
    • 67249143972 scopus 로고    scopus 로고
    • Mutual authentication protocol for low computational capacity rfid systems
    • IEEE GLOBECOM 2008. IEEE
    • G. Godor, M. Antal, and S. Imre. Mutual Authentication Protocol for Low Computational Capacity RFID Systems. In Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, pages 1-5, 2008.
    • (2008) Global Telecommunications Conference 2008 , pp. 1-5
    • Godor, G.1    Antal, M.2    Imre, S.3
  • 20
    • 34548815120 scopus 로고    scopus 로고
    • Are standards compliant elliptic curve cryptosystems feasible on rfid?
    • S. Kumar and C. Paar. Are standards compliant elliptic curve cryptosystems feasible on rfid? In In Proc. of RFIDSec06, 2006.
    • (2006) Proc. of RFIDSec06
    • Kumar, S.1    Paar, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.