메뉴 건너뛰기




Volumn 19, Issue 1, 2017, Pages 39-46

An improved privacy protection security protocol based on NFC

Author keywords

Identity authentication; NFC; Privacy preserve; Pseudonym

Indexed keywords

NETWORK SECURITY;

EID: 85014085189     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: 10.6633/IJNS.201701.19(1).05     Document Type: Article
Times cited : (10)

References (20)
  • 1
    • 84894255457 scopus 로고    scopus 로고
    • An enhanced access control scheme in wireless sensor networks
    • S. Chatterjee, A. K. Das, and J. K. Sing, "An enhanced access control scheme in wireless sensor networks," Ad Hoc & Sensor Wireless Networks, vol. 21, no. 2, pp. 121-149, 2014.
    • (2014) Ad Hoc & Sensor Wireless Networks , vol.21 , Issue.2 , pp. 121-149
    • Chatterjee, S.1    Das, A.K.2    Sing, J.K.3
  • 3
    • 84876136714 scopus 로고    scopus 로고
    • Conditional privacy preserving security protocol for NFC applications
    • H. Eun, H. Lee, and H. Oh, "Conditional privacy preserving security protocol for NFC applications," IEEE Transactions on Consumer Electronics, vol. 59, no. 1, pp. 153-160, 2013.
    • (2013) IEEE Transactions on Consumer Electronics , vol.59 , Issue.1 , pp. 153-160
    • Eun, H.1    Lee, H.2    Oh, H.3
  • 5
    • 84876134814 scopus 로고    scopus 로고
    • Technical Report, Market Analysis and Statistics, May
    • Gartner, Market Insight: The Outlook on Mobile Payment, Technical Report, Market Analysis and Statistics, May 2010.
    • (2010) Market Insight: The Outlook on Mobile Payment
  • 6
    • 84994282850 scopus 로고    scopus 로고
    • Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
    • P. Gope and T. L. Hwang, "Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks," IEEE Systems Journal, vol. 99, no. 1, pp. 1-10, 2015.
    • (2015) IEEE Systems Journal , vol.99 , Issue.1 , pp. 1-10
    • Gope, P.1    Hwang, T.L.2
  • 7
    • 84926037301 scopus 로고    scopus 로고
    • Secure pseudonym-based near field communication protocol for the consumer internet of things
    • D. He, N. Kumar, and J. H. Lee, "Secure pseudonym-based near field communication protocol for the consumer internet of things," IEEE Transactions on Consumer Electronics, vol. 61, no. 1, pp. 56-62, 2015.
    • (2015) IEEE Transactions on Consumer Electronics , vol.61 , Issue.1 , pp. 56-62
    • He, D.1    Kumar, N.2    Lee, J.H.3
  • 8
    • 80052372468 scopus 로고    scopus 로고
    • PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs
    • D. Huang, S. Misra, M. Verma, and G. Xue, "PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs," IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 3, pp. 7336-746, 2011.
    • (2011) IEEE Transactions on Intelligent Transportation Systems , vol.12 , Issue.3 , pp. 7336-7746
    • Huang, D.1    Misra, S.2    Verma, M.3    Xue, G.4
  • 12
    • 82755161820 scopus 로고    scopus 로고
    • Securing mobile network prefix provisioning for NEMO based vehicular networks
    • J. H. Lee, J. Chen, and T. Ernst, "Securing mobile network prefix provisioning for NEMO based vehicular networks," Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 170-187, 2012.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1-2 , pp. 170-187
    • Lee, J.H.1    Chen, J.2    Ernst, T.3
  • 13
    • 85014069074 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of lai's authenticated group key transfer protocol
    • J. Li, S. Li, and Z. Chen, "Cryptanalysis and improvement of lai's authenticated group key transfer protocol," Application Research of Computers, vol. 32, no. 1, pp. 254-257, 2015.
    • (2015) Application Research of Computers , vol.32 , Issue.1 , pp. 254-257
    • Li, J.1    Li, S.2    Chen, Z.3
  • 14
    • 85014454139 scopus 로고    scopus 로고
    • Elliptic curve lightweight authentication and key agreement scheme
    • X. Niu, S. Guo, and Y. Wang, "Elliptic curve lightweight authentication and key agreement scheme," Computer Science, vol. 42, no. 1, pp. 137-141, 2015.
    • (2015) Computer Science , vol.42 , Issue.1 , pp. 137-141
    • Niu, X.1    Guo, S.2    Wang, Y.3
  • 15
    • 84947086841 scopus 로고    scopus 로고
    • A lightweight RFID security protocol based on elliptic curve crytograph
    • Q. Qian, Y. L. Jia, and R. Zhang, "A lightweight RFID security protocol based on elliptic curve crytograph," International Journal of Network Security, vol. 18, no. 2, pp. 354-361, 2016.
    • (2016) International Journal of Network Security , vol.18 , Issue.2 , pp. 354-361
    • Qian, Q.1    Jia, Y.L.2    Zhang, R.3
  • 16
    • 84939973365 scopus 로고    scopus 로고
    • Security analysis and improvement on two RFID authentication protocols
    • S. Wang, S. Liu, and D. Chen, "Security analysis and improvement on two RFID authentication protocols," Wireless Personal Communications, vol. 82, no. 1, pp. 21-33, 2015.
    • (2015) Wireless Personal Communications , vol.82 , Issue.1 , pp. 21-33
    • Wang, S.1    Liu, S.2    Chen, D.3
  • 17
    • 84894321636 scopus 로고    scopus 로고
    • An efficient anonymous batch authenticated and key agreement scheme using self-certified public keys in VANETs
    • Xian, Oct
    • X. Wang, Z. Huang, Q. Wen, and H. Zhang, "An efficient anonymous batch authenticated and key agreement scheme using self-certified public keys in VANETs," in IEEE Region 10 Conference on TEN-CON, pp. 1-4, Xian, Oct. 2013.
    • (2013) IEEE Region 10 Conference on TEN-CON , pp. 1-4
    • Wang, X.1    Huang, Z.2    Wen, Q.3    Zhang, H.4
  • 18
    • 79953083437 scopus 로고    scopus 로고
    • A mutual authentication protocol for RFID
    • C. H. Wei, M. S. Hwang, and A. Y. H Chin, "A mutual authentication protocol for RFID," IEEE IT Professional, vol. 13, no. 2, pp. 20-24, 2011.
    • (2011) IEEE IT Professional , vol.13 , Issue.2 , pp. 20-24
    • Wei, C.H.1    Hwang, M.S.2    Chin, A.Y.H.3
  • 19
    • 84866074525 scopus 로고    scopus 로고
    • An improved authentication protocol for mobile agent device in RFID
    • C. H. Wei, M. S. Hwang, and Y. H. Chin, "An improved authentication protocol for mobile agent device in RFID," International Journal ofNetwork Security, vol. 10, no. 5, pp. 508-520, 2012.
    • (2012) International Journal ofNetwork Security , vol.10 , Issue.5 , pp. 508-520
    • Wei, C.H.1    Hwang, M.S.2    Chin, Y.H.3
  • 20
    • 85014091308 scopus 로고    scopus 로고
    • Research on privacy-preserving key technologies of the NFC mobile application system
    • Z. Wu, "Research on privacy-preserving key technologies of the NFC mobile application system," The PLA Information Engineering University, 2012.
    • (2012) The PLA Information Engineering University
    • Wu, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.