메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2897-2901

A dynamic-encryption authentication scheme for M2M security in cyber-physical systems

Author keywords

authentication; dynamic encryption; M2M

Indexed keywords

CRYPTOGRAPHY; CYBER PHYSICAL SYSTEM; CYBERSECURITY; DENIAL-OF-SERVICE ATTACK; DYNAMICS; EMBEDDED SYSTEMS; ENVIRONMENTAL TECHNOLOGY; MACHINE-TO-MACHINE COMMUNICATION; MOBILE SECURITY; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 84904112065     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2013.6831514     Document Type: Conference Paper
Times cited : (17)

References (22)
  • 2
    • 84870065586 scopus 로고    scopus 로고
    • A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
    • July. [Online]. Available: 10. 1016/j. adhoc. 2012. 06. 015
    • R. Doss, S. Sundaresan, and W. Zhou, "A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems," Ad Hoc Networks, July 2012. [Online]. Available: 10. 1016/j. adhoc. 2012. 06. 015
    • (2012) Ad Hoc Networks
    • Doss, R.1    Sundaresan, S.2    Zhou, W.3
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Univerally composable security: A new paradigm for cryptographic protocols
    • "Univerally Composable Security: A new paradigm for cryptographic protocols," IEEE Symp. On Foundations of Computer Science (FOCS 2001), pp. 136-145, 2001.
    • (2001) IEEE Symp. on Foundations of Computer Science (FOCS 2001 , pp. 136-145
  • 10
    • 76849115734 scopus 로고    scopus 로고
    • The tag authentication scheme using self-shrinking generator on RFID system
    • H. Lee and D. Hong, "The tag authentication scheme using self-shrinking generator on RFID system," Transactions on Engineering, Computing and Technology, vol. 18, pp. 52-57, 2006.
    • (2006) Transactions on Engineering, Computing and Technology , vol.18 , pp. 52-57
    • Lee, H.1    Hong, D.2
  • 13
    • 77949415170 scopus 로고    scopus 로고
    • Vulnerabilities in some recently proposed RFID ownership transfer protocols
    • Mar
    • G. Kapoor and S. Piramuthu, "Vulnerabilities in some recently proposed RFID ownership transfer protocols," IEEE Communications Letters, vol. 14, no. 3, pp. 260-262, Mar 2010.
    • (2010) IEEE Communications Letters , vol.14 , Issue.3 , pp. 260-262
    • Kapoor, G.1    Piramuthu, S.2
  • 16
    • 77953303552 scopus 로고    scopus 로고
    • Lighweight mutual authentication and ownership transfer for rfid systems
    • Mar
    • L. Kuseng, Z. Yu, Y. Wei, and Y. Guan, "Lighweight Mutual Authentication and Ownership Transfer for RFID Systems," in IEEE INFOCOM 2010, Mar 2010, pp. 1-5.
    • (2010) IEEE INFOCOM 2010 , pp. 1-5
    • Kuseng, L.1    Yu, Z.2    Wei, Y.3    Guan, Y.4
  • 17
    • 59249097693 scopus 로고    scopus 로고
    • A simple privacy protecting scheme enabling delegation and ownership transfer for rfid tags
    • Nov
    • S. Fouladgar and H. Afifi, "A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags," Journal of Communications, vol. 2, no. 6, pp. 6-13, Nov 2007.
    • (2007) Journal of Communications , vol.2 , Issue.6 , pp. 6-13
    • Fouladgar, S.1    Afifi, H.2
  • 19
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • Apr
    • B. Song and C. J. Mitchell, "Scalable RFID security protocols supporting tag ownership transfer," Computer Communications, vol. 34, no. 4, pp. 556-566, Apr 2011.
    • (2011) Computer Communications , vol.34 , Issue.4 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 21


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.