메뉴 건너뛰기




Volumn 7, Issue 4, 2008, Pages 1400-1407

Secure and Serverless RFID Authentication and Search Protocols

Author keywords

Authentication; privacy; RFID; search; security

Indexed keywords


EID: 85008055668     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2008.061012     Document Type: Article
Times cited : (146)

References (32)
  • 1
    • 80051969734 scopus 로고    scopus 로고
    • A robust and secure RFID-based pedigree system (short paper)
    • C. C. Tan and Q. Li, “A robust and secure RFID-based pedigree system (short paper),” in ICICS, 2006
    • (2006) ICICS
    • Tan, C.C.1    Li, Q.2
  • 2
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • T. Dimitriou, “A lightweight RFID protocol to protect against traceability and cloning attacks,” in SecureComm, 2005
    • (2005) SecureComm
    • Dimitriou, T.1
  • 3
    • 33744958813 scopus 로고    scopus 로고
    • Efficient authentication for low-cost RFID systems
    • S.-M. Lee, Y. J. Hwang, D. H. Lee, and J. I. L. Lim, “Efficient authentication for low-cost RFID systems,” in ICCSA 2005
    • (2005) ICCSA
    • Lee, S.-M.1    Hwang, Y.J.2    Lee, D.H.3    Lim, J.I.L.4
  • 5
    • 33750290259 scopus 로고    scopus 로고
    • YA-TRAP: Yet another trivial RFID authentication protocol
    • G. Tsudik, “YA-TRAP: Yet another trivial RFID authentication protocol,” in PerCom 2006
    • (2006) PerCom
    • Tsudik, G.1
  • 6
    • 33845386166 scopus 로고    scopus 로고
    • Lightweight authentication protocols for low-cost RFID tags
    • I. Vajda and L. Buttyan, “Lightweight authentication protocols for low-cost RFID tags,” in Ubicomp 2003
    • (2003) Ubicomp
    • Vajda, I.1    Buttyan, L.2
  • 7
    • 85008044037 scopus 로고    scopus 로고
    • G. Avoine, “http://lasecwww.epfl.ch/gavoine/rfid/.”
    • Avoine, G.1
  • 8
    • 30344451754 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • A. Juels, “RFID security and privacy: A research survey,” Manuscript, 2005
    • (2005) Manuscript
    • Juels, A.1
  • 10
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • S. Weis, S. Sarma, R. Rivest, and D. Engels, “Security and privacy aspects of low-cost radio frequency identification systems,” in SPC 2003
    • (2003) SPC
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 11
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • D. Molnar and D. Wagner, “Privacy and security in library RFID: Issues, practices, and architectures,” in CCS, 2004
    • (2004) CCS
    • Molnar, D.1    Wagner, D.2
  • 12
    • 57849147967 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • T. Li and G. Wang, “Security analysis of two ultra-lightweight RFID authentication protocols,” in IFIP SEC 2007
    • (2007) IFIP SEC
    • Li, T.1    Wang, G.2
  • 13
    • 34548162681 scopus 로고    scopus 로고
    • Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol
    • T. Li and R. H. Deng, “Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol,” in AReS 2007
    • (2007) AReS
    • Li, T.1    Deng, R.H.2
  • 14
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • M. Zhang and Y. Fang, “Security analysis and enhancements of 3GPP authentication and key agreement protocol,” IEEE Trans. Wireless Commun., 2005
    • (2005) IEEE Trans. Wireless Commun
    • Zhang, M.1    Fang, Y.2
  • 17
    • 36249031858 scopus 로고    scopus 로고
    • HB and related lightweight authentication protocols for secure RFID tag/reader authentication
    • S. Piramuthu, “HB and related lightweight authentication protocols for secure RFID tag/reader authentication,” in CollECTeR 2006
    • (2006) CollECTeR
    • Piramuthu, S.1
  • 18
    • 85008029405 scopus 로고    scopus 로고
    • An active attack against HB+ - a provably secure lightweight authentication protocol
    • H. Gilbert, M. Robshaw, and H. Sibert, “An active attack against HB+ - a provably secure lightweight authentication protocol,” Manuscript, 2005
    • (2005) Manuscript
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 19
    • 33845920117 scopus 로고    scopus 로고
    • HB++: a lightweight authentication protocol secure against some attacks
    • J. Bringer, H. Chabanne, and D. Emmanuelle, “HB++: a lightweight authentication protocol secure against some attacks,” in SecPerU 2006
    • (2006) SecPerU
    • Bringer, J.1    Chabanne, H.2    Emmanuelle, D.3
  • 21
    • 34548830043 scopus 로고    scopus 로고
    • A case against currently used hash functions in rfid protocols
    • ” in
    • M. Feldhofer and C. Rechberger, “A case against currently used hash functions in rfid protocols.” in OTM Workshops (1), 2006
    • (2006) OTM Workshops (1)
    • Feldhofer, M.1    Rechberger, C.2
  • 22
    • 77953307049 scopus 로고    scopus 로고
    • Physically unclonable function-based security and privacy in rfid systems
    • L. Bolotnyy and G. Robins, “Physically unclonable function-based security and privacy in rfid systems,” in PerCom 07
    • PerCom 07
    • Bolotnyy, L.1    Robins, G.2
  • 24
    • 34548815120 scopus 로고    scopus 로고
    • Are standards compliant elliptic curve cryptosystems feasible on RFID?
    • ” RFIDSec 06
    • S. Kumar and C. Paar, “Are standards compliant elliptic curve cryptosystems feasible on RFID?” RFIDSec 06
    • Kumar, S.1    Paar, C.2
  • 25
    • 35348832191 scopus 로고    scopus 로고
    • An elliptic curve processor suitable for RFID-tags
    • Cryptology ePrint Archive, Report /227
    • L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, “An elliptic curve processor suitable for RFID-tags,” Cryptology ePrint Archive, Report 2006/227
    • (2006)
    • Batina, L.1    Guajardo, J.2    Kerins, T.3    Mentens, N.4    Tuyls, P.5    Verbauwhede, I.6
  • 27
    • 46849122785 scopus 로고    scopus 로고
    • Efficient implementation of public key cryptosystems on mote sensors (short paper)
    • H. Wang and Q. Li, “Efficient implementation of public key cryptosystems on mote sensors (short paper),” in ICICS 06
    • ICICS 06
    • Wang, H.1    Li, Q.2
  • 28
    • 85008052972 scopus 로고    scopus 로고
    • Distributed user access control in sensor networks
    • H. Wang and Q. Li, “Distributed user access control in sensor networks,” in DCOSS 06
    • DCOSS 06
    • Wang, H.1    Li, Q.2
  • 29
    • 85088055036 scopus 로고    scopus 로고
    • Strengthening EPC tags against cloning
    • A. Juels, “Strengthening EPC tags against cloning,” in WiSe'05
    • WiSe'05
    • Juels, A.1
  • 30
    • 34547617685 scopus 로고    scopus 로고
    • Mining compressed commodity workflows from massive rfid data sets
    • ” in
    • H. Gonzalez, J. Han, and X. Li, “Mining compressed commodity workflows from massive rfid data sets.” in CIKM 2006
    • CIKM 2006
    • Gonzalez, H.1    Han, J.2    Li, X.3
  • 31
    • 33749586133 scopus 로고    scopus 로고
    • Warehousing and analyzing massive rfid data sets
    • ” in
    • H. Gonzalez, J. Han, X. Li, and D. Klabjan, “Warehousing and analyzing massive rfid data sets.” in ICDE 2006
    • ICDE 2006
    • Gonzalez, H.1    Han, J.2    Li, X.3    Klabjan, D.4
  • 32
    • 2942524989 scopus 로고    scopus 로고
    • Squealing euros: Privacy protection in RFID-enabled banknotes
    • A. Juels and R. Pappu, “Squealing euros: Privacy protection in RFID-enabled banknotes,” in FC'03
    • FC'03
    • Juels, A.1    Pappu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.