메뉴 건너뛰기




Volumn 62, Issue 1, 2016, Pages 30-38

SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms

Author keywords

AVISPA; impersonation attack; lifetime basedpseudonym; Near field communication; security

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY; INTERNET PROTOCOLS; NEAR FIELD COMMUNICATION; NETWORK SECURITY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84964350666     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2016.7448560     Document Type: Article
Times cited : (70)

References (25)
  • 1
    • 84926055211 scopus 로고    scopus 로고
    • Market insight: The outlook on mobile payment
    • May
    • Gartner, "Market Insight: The Outlook on Mobile Payment," Market Analysis and Statistics, May 2010.
    • (2010) Market Analysis and Statistics
    • Gartner1
  • 3
    • 84937853874 scopus 로고    scopus 로고
    • A secure biometrics-based multi-server authentication protocol using smart cards
    • Jun.
    • V. Odelu, A. K. Das, and A. Goswami, "A secure biometrics-based multi-server authentication protocol using smart cards," IEEE Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 1953-1966, Jun. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.9 , pp. 1953-1966
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 4
    • 79960940984 scopus 로고    scopus 로고
    • Near field communication
    • July
    • R. Want, "Near field communication," IEEE Pervasive Comput., vol.10, no.3, pp. 4 - 7, July. 2011.
    • (2011) IEEE Pervasive Comput. , vol.10 , Issue.3 , pp. 4-7
    • Want, R.1
  • 6
    • 84880839683 scopus 로고    scopus 로고
    • A survey on near field communication (NFC) technology
    • Aug.
    • V. Coskun, B. Ozdenizci, and K. Ok, "A survey on near field communication (NFC) technology," Wireless Pers. Commun., vol. 71, no. 3, pp. 2259-2294, Aug. 2013.
    • (2013) Wireless Pers. Commun. , vol.71 , Issue.3 , pp. 2259-2294
    • Coskun, V.1    Ozdenizci, B.2    Ok, K.3
  • 7
    • 84928568693 scopus 로고    scopus 로고
    • Near-field communication: It pays: Mobile payment systems explained and explored
    • Apr.
    • W. Lumpkins and M. Joyce, "Near-Field Communication: It Pays: Mobile payment systems explained and explored," IEEE Consum. Electron. Mag., vol.4, no.2, pp.49-53, Apr. 2015.
    • (2015) IEEE Consum. Electron. Mag. , vol.4 , Issue.2 , pp. 49-53
    • Lumpkins, W.1    Joyce, M.2
  • 8
  • 15
    • 82755161820 scopus 로고    scopus 로고
    • Securing mobile network prefix provisioning for NEMO based vehicular networks
    • Jan.
    • J. H. Lee, J. Chen, and T. Ernst, "Securing mobile network prefix provisioning for NEMO based vehicular networks," Math. Comput. Model., vol. 55, no. 1, pp. 170-187, Jan. 2012.
    • (2012) Math. Comput. Model. , vol.55 , Issue.1 , pp. 170-187
    • Lee, J.H.1    Chen, J.2    Ernst, T.3
  • 17
    • 84876136714 scopus 로고    scopus 로고
    • Conditional privacy preserving security protocol for NFC applications
    • Apr.
    • H. Eun, H. Lee, and H. Oh, "Conditional privacy preserving security protocol for NFC applications," IEEE Trans. Consumer Electron., vol. 59, no. 1, pp.153-160, Apr. 2013.
    • (2013) IEEE Trans. Consumer Electron. , vol.59 , Issue.1 , pp. 153-160
    • Eun, H.1    Lee, H.2    Oh, H.3
  • 18
    • 84926037301 scopus 로고    scopus 로고
    • Secure pseudonym-based near field communication protocol for the consumer internet of things
    • Mar.
    • D. He, N. Kumar, and J. H. Lee, "Secure pseudonym-based near field communication protocol for the consumer internet of things," IEEE Trans. Consumer Electron., vol. 61, no. 1, pp. 56-62, Mar. 2015.
    • (2015) IEEE Trans. Consumer Electron. , vol.61 , Issue.1 , pp. 56-62
    • He, D.1    Kumar, N.2    Lee, J.H.3
  • 19
    • 84928801756 scopus 로고    scopus 로고
    • A secure and efficient ECCbased user anonymity preserving single sign-on scheme for distributed computer networks
    • Jun.
    • V. Odelu, A. K. Das, and A. Goswami, "A secure and efficient ECCbased user anonymity preserving single sign-on scheme for distributed computer networks," Secur. Comm. Netw., vol. 8, no. 9, pp. 1732-1751, Jun. 2015.
    • (2015) Secur. Comm. Netw. , vol.8 , Issue.9 , pp. 1732-1751
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 20
    • 19744367735 scopus 로고    scopus 로고
    • OFMC: A symbolic model checker for security protocols
    • Jun.
    • D. Basin, S. Mödersheim, and V. Luca, "OFMC: A symbolic model checker for security protocols," Int. J. Inf. Secur., vol. 4, no. 3 pp. 181- 208, Jun. 2005.
    • (2005) Int. J. Inf. Secur. , vol.4 , Issue.3 , pp. 181-208
    • Basin, D.1    Mödersheim, S.2    Luca, V.3
  • 21
    • 26444497860 scopus 로고    scopus 로고
    • The AVISPA Tool for the Automated Validation of Internet Security protocols and Applications
    • Scotland, UK, LNCS, July
    • A. Armando et al., "The AVISPA Tool for the Automated Validation of Internet Security protocols and Applications," in Proc. International Conference on Computer Aided Verification, Scotland, UK, LNCS, vol. 3576, pp. 281-285, July 2005.
    • (2005) Proc. International Conference on Computer Aided Verification , vol.3576 , pp. 281-285
    • Armando, A.1
  • 22
    • 84870657665 scopus 로고    scopus 로고
    • An novel three-party authentication key exchange protocol using one-time key
    • Jan.
    • C. Lv, M. Ma, H. Li, J. Ma, and Y. Zhang, "An novel three-party authentication key exchange protocol using one-time key," J. Netw. Comput. Appl., vol. 36, no. 1, pp. 498-503, Jan. 2013.
    • (2013) J. Netw. Comput. Appl. , vol.36 , Issue.1 , pp. 498-503
    • Lv, C.1    Ma, M.2    Li, H.3    Ma, J.4    Zhang, Y.5
  • 23
    • 84929837704 scopus 로고    scopus 로고
    • A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks
    • Jun.
    • A. K. Das, "A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks," Wireless Pers. Commun., vol. 82, no. 3, pp. 1377- 1404, Jun. 2015.
    • (2015) Wireless Pers. Commun. , vol.82 , Issue.3 , pp. 1377-1404
    • Das, A.K.1
  • 24
    • 85005969862 scopus 로고    scopus 로고
    • A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
    • accepted for publication Jan.
    • A. K. Das, "A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor," accepted for publication in Int. J. Commun. Syst., Jan. 2015.
    • (2015) Int. J. Commun. Syst.
    • Das, A.K.1
  • 25
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev, and A. Yao, "On the security of public key protocols," IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.