메뉴 건너뛰기




Volumn 0, Issue 9783642143120, 2010, Pages 281-305

Enhancing RFID security and privacy by physically unclonable functions

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; SUPPLY CHAINS;

EID: 85019715933     PISSN: 16197100     EISSN: 2197845X     Source Type: Book Series    
DOI: 10.1007/978-3-642-14452-3_13     Document Type: Chapter
Times cited : (53)

References (68)
  • 2
    • 70349117963 scopus 로고    scopus 로고
    • Atmel Corporation. Innovative IDIC solutions. http://www.atmel.com/dyn/resources/prod_documents/doc4602.pdf, 2007
    • (2007) Innovative IDIC Solutions
  • 4
    • 33745621564 scopus 로고    scopus 로고
    • Reducing Time Complexity in RFID systems
    • Kingston, ON, Canada, 11-12 Aug 2005. Lecture Notes in Computer Science, Springer, Berlin
    • G. Avoine, E. Dysli, P. Oechslin, in Reducing Time Complexity in RFID systems. 12th International Workshop on Selected Areas in Cryptography (SAC), Kingston, ON, Canada, 11-12 Aug 2005. Lecture Notes in Computer Science, vol. 3897 (Springer, Berlin, 2005), pp. 291-306
    • (2005) 12Th International Workshop on Selected Areas in Cryptography (SAC) , vol.3897 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 9
    • 77049116572 scopus 로고    scopus 로고
    • In Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
    • Rhodes, Greece, 10-11 July 2009. Lecture Notes in Computer Science, Springer, July
    • P. D’Arco, A. Scafuro, I. Visconti, in Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. Proceedings of ALGOSENSORS, Rhodes, Greece, 10-11 July 2009. Lecture Notes in Computer Science (Springer, July 2009)
    • (2009) Proceedings of ALGOSENSORS
    • D’Arco, P.1    Scafuro, A.2    Visconti, I.3
  • 10
    • 71549150422 scopus 로고    scopus 로고
    • Semi-Destructive Privacy in DoS-Enabled RFID Systems
    • Leuven, Belgium, 30 June-2 July 2009
    • P. D’Arco, A. Scafuro, I. Visconti, in Semi-Destructive Privacy in DoS-Enabled RFID Systems. Proceedings of RFIDSec, Leuven, Belgium, 30 June-2 July 2009, July 2009
    • (2009) Proceedings of Rfidsec
    • D’Arco, P.1    Scafuro, A.2    Visconti, I.3
  • 11
    • 49049105769 scopus 로고    scopus 로고
    • Design and Implementation of PUF-Based Unclonable RFID ICs for Anti-counterfeiting and Security Applications
    • Las Vegas, NV, USA, 16-17 April, (IEEE Computer Society, 2008)
    • S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, in Design and Implementation of PUF-Based Unclonable RFID ICs for Anti-counterfeiting and Security Applications. IEEE International Conference on RFID 2008, Las Vegas, NV, USA, 16-17 April, 2008 (IEEE Computer Society, 2008), pp. 58-64
    • (2008) IEEE International Conference on RFID 2008 , pp. 58-64
    • Devadas, S.1    Suh, E.2    Paral, S.3    Sowell, R.4    Ziola, T.5    Khandelwal, V.6
  • 13
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Switzerland, 2-6 May, 2004, Proceedings. Lecture Notes in Computer Science
    • Y. Dodis, L. Reyzin, A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3027 (Springer, 2004), pp. 523-540
    • (2004) International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 16
    • 85019703744 scopus 로고    scopus 로고
    • Web site of EPCglobal Inc
    • EPCglobal Inc. Web site of EPCglobal Inc http://www.epcglobalinc.org/, April 2008
    • (2008)
  • 21
    • 54249085502 scopus 로고    scopus 로고
    • Good Variants of HB+ Are Hard to Find. InG. Tsudik. Financial Cryptography and Data Security
    • Cozumel, Mexico, 28-31 Jan 2008, Revised Selected Papers. Lecture Notes in Computer Science, (Springer
    • H. Gilbert, M.J.B. Robshaw, Y. Seurin, in Good Variants of HB+ Are Hard to Find. inG. Tsudik. Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, 28-31 Jan 2008, Revised Selected Papers. Lecture Notes in Computer Science, (Springer, 2008), pp. 156-170
    • (2008) 12Th International Conference, FC 2008 , pp. 156-170
    • Gilbert, H.1    Robshaw, M.J.B.2    Seurin, Y.3
  • 22
    • 35048899238 scopus 로고    scopus 로고
    • In Universal Re-encryption for Mixnets. The Cryptographers’ Track at the RSA Conference
    • San Francisco, CA, USA, 23-27 Feb, (Springer, 2004)
    • P. Golle, M. Jakobsson, A. Juels, P. Syverson, in Universal Re-encryption for Mixnets. The Cryptographers’ Track at the RSA Conference 2004, Proceedings. Lecture Notes in Computer Science, San Francisco, CA, USA, 23-27 Feb 2004 (Springer, 2004), pp. 163-178.
    • (2004) Proceedings. Lecture Notes in Computer Science , pp. 163-178
    • Golle, P.1    Jakobsson, M.2    Juels, A.3    Syverson, P.4
  • 23
    • 57049137188 scopus 로고    scopus 로고
    • A new formal proof model for RFID location privacy
    • J.H. Ha, S.J. Moon, J. Zhou, J.C. Ha, A new formal proof model for RFID location privacy. In Jajodia and Lopez [28], pp. 267-281
    • In Jajodia and Lopez , Issue.28 , pp. 267-281
    • Ha, J.H.1    Moon, S.J.2    Zhou, J.3    Ha, J.C.4
  • 24
    • 2942625823 scopus 로고    scopus 로고
    • In Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers
    • Orlando, FL, USA, 14-17, (IEEE Computer Society, 2004)
    • D. Henrici, P. Müller, in Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, FL, USA, 14-17 Mar 2004 (IEEE Computer Society, 2004), pp. 149-153
    • (2004) Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 25
    • 50249134033 scopus 로고    scopus 로고
    • Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags
    • Malaga, Spain, 11-13 July
    • D.E. Holcomb, W.P. Burleson, K. Fu, Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags. Conference on RFID Security 2007, Malaga, Spain, 11-13 July 2007
    • (2007) Conference on RFID Security 2007
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 27
    • 85019707972 scopus 로고    scopus 로고
    • Machine Readable Travel Documents, Doc 9303
    • I.C.A. Organization. Machine Readable Travel Documents, Doc 9303, Part 1 Machine Readable Passports, 5th edn., 2003
    • (2003) Part 1 Machine Readable Passports, 5Th Edn.
  • 28
    • 85019685347 scopus 로고    scopus 로고
    • (eds.), Lecture Notes in Computer Science, Malaga, Spain, 6-8 Oct 2008, Springer
    • S. Jajodia, J. Lopez (eds.), Computer Security - ESORICS 2008. Lecture Notes in Computer Science, Malaga, Spain, 6-8 Oct 2008, vol. 5283 (Springer, 2008)
    • (2008) Computer Security - ESORICS 2008 , vol.5283
    • Jajodia, S.1    Lopez, J.2
  • 29
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)
    • Revised Selected Papers. Lecture Notes in Computer Science, Amalfi, Italy, 8-10 Sep 2004, Springer
    • A. Juels, in Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract). 4th International Conference on Security in Communication Networks (SCN) 2004, Revised Selected Papers. Lecture Notes in Computer Science, Amalfi, Italy, 8-10 Sep 2004, vol. 3352 (Springer, 2004), pp. 149-164
    • (2004) 4Th International Conference on Security in Communication Networks (SCN) 2004 , vol.3352 , pp. 149-164
    • Juels, A.1
  • 30
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and Privacy: A Research Survey
    • A. Juels, in RFID Security and Privacy: A Research Survey. J. Select. Areas Commun. 24(2), 381-395 (Feb 2006)
    • (2006) J. Select. Areas Commun , vol.24 , Issue.2 , pp. 381-395
    • Juels, A.1
  • 31
    • 35248832722 scopus 로고    scopus 로고
    • In Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
    • Revised Papers. Lecture Notes in Computer Science, Gosier, Guadeloupe, FWI, 27-30, (Springer, 2003)
    • A. Juels, R. Pappu, in Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. 7th International Conference on Financial Cryptography (FC) 2003, Revised Papers. Lecture Notes in Computer Science, Gosier, Guadeloupe, FWI, 27-30 Jan 2003, vol. 2742 (Springer, 2003), pp. 103-121
    • (2003) 7Th International Conference on Financial Cryptography (FC) 2003 , vol.2742 , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 32
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols. In Advances in Cryptology - CRYPTO 2005
    • ed. by V. Shoup, Santa Barbara, CA, USA, 14-18 Aug 2005, Proceedings. Lecture Notes in Computer Science, Springer
    • A. Juels, S.A. Weis, Authenticating pervasive devices with human protocols. in Advances in Cryptology - CRYPTO 2005, ed. by V. Shoup. 25th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14-18 Aug 2005, Proceedings. Lecture Notes in Computer Science, vol. 3621 (Springer, 2005), pp. 293-308
    • (2005) 25Th Annual International Cryptology Conference , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 34
    • 38149003666 scopus 로고    scopus 로고
    • Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
    • in S.D. Galbraith, Cirencester, UK, 18-20, Proceedings. Lecture Notes in Computer Science, (Springer, 2007)
    • J. Katz, in Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise. in S.D. Galbraith. Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, 18-20 Dec 2007, Proceedings. Lecture Notes in Computer Science, vol. 4887 (Springer, 2007), pp. 1-15
    • (2007) Cryptography and Coding, 11Th IMA International Conference , vol.4887 , pp. 1-15
    • Katz, J.1
  • 35
    • 33746104831 scopus 로고    scopus 로고
    • Parallel and concurrent security of the HB and HB+ protocols. In Advances in Cryptology — EUROCRYPT 2006
    • ed. by S. Vaudenay, St. Petersburg, Russia, 28 May -1 June 2006, Proceedings. Lecture Notes in Computer Science, Springer
    • J. Katz, J.S. Shin, Parallel and concurrent security of the HB and HB+ protocols. in Advances in Cryptology — EUROCRYPT 2006, ed. by S. Vaudenay. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 28 May -1 June 2006, Proceedings. Lecture Notes in Computer Science, vol. 4004 (Springer, 2006), pp. 73-87
    • (2006) 24Th Annual International Conference on the Theory and Applications of Cryptographic Techniques , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.S.2
  • 39
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Santa Barbara, CA, USA, Proceedings, 18-22, (Springer, 1996)
    • P.C. Kocher, in Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. 16th Annual International Cryptology Conference, Santa Barbara, CA, USA, Proceedings, 18-22 Aug 1996. Lecture Notes in Computer Science, vol. 1109 (Springer, 1996), pp. 104-113
    • (1996) 16Th Annual International Cryptology Conference , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 40
    • 84977783611 scopus 로고    scopus 로고
    • Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
    • Raleigh, NC, USA, 4-7, Lecture Notes in Computer Science, (Springer, 2006)
    • C.H. Lim, T. Kwon, in Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. 8th International Conference on Information and Communications Security (ICICS), Raleigh, NC, USA, 4-7 Dec 2006. Lecture Notes in Computer Science, vol. 4307 (Springer, 2006), pp. 1-20
    • (2006) 8Th International Conference on Information and Communications Security (ICICS) , vol.4307 , pp. 1-20
    • Lim, C.H.1    Kwon, T.2
  • 42
    • 14844294769 scopus 로고    scopus 로고
    • In Privacy and Security in Library RFID: Issues, Practices, and Architectures
    • Washington, DC, USA, 25-29, (ACM Press, 2004)
    • D. Molnar, D. Wagner, in Privacy and Security in Library RFID: Issues, Practices, and Architectures. Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 25-29 Oct 2004 (ACM Press, 2004), pp. 210-219
    • (2004) Proceedings of the 11Th ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 44
    • 70350383766 scopus 로고    scopus 로고
    • In New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing
    • France, 21-25, Lecture Notes in Computer Science, (Springer, 2009)
    • C.Y. Ng, W. Susilo, Y. Mu, R. Safavi-Naini, in New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing. Proceedings of ESORICS, Saint Malo, France, 21-25 Sept 2009. Lecture Notes in Computer Science, vol. 5789 (Springer, 2009), pp. 321-336
    • (2009) Proceedings of ESORICS, Saint Malo , vol.5789 , pp. 321-336
    • Ng, C.Y.1    Susilo, W.2    Mu, Y.3    Safavi-Naini, R.4
  • 47
    • 71549116235 scopus 로고    scopus 로고
    • NXP Semiconductors
    • NXP Semiconductors. MIFARE Smartcard ICs. http://www.mifare.net/products/smartcardics/, Sept 2008
    • (2008) MIFARE Smartcard Ics
  • 49
    • 0022793132 scopus 로고
    • How to construct random functions
    • S. Micali, O. Goldreich, S. Goldwasser, How to construct random functions. J. ACM 33(4), 792-807 (1986)
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Micali, S.1    Goldreich, O.2    Goldwasser, S.3
  • 52
    • 58349109583 scopus 로고    scopus 로고
    • On the security of HB# against a man-in-the-middle attack. In Advances in Cryptology - ASIACRYPT 2008
    • Melbourne, Australia, 7-11, Proceedings. Lecture Notes in Computer Science, Springer, 2008
    • K. Ouafi, R. Overbeck, S. Vaudenay, On the security of HB# against a man-in-the-middle attack. in Advances in Cryptology - ASIACRYPT 2008, ed. by J. Pieprzyk. 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, 7-11 Dec 2008, Proceedings. Lecture Notes in Computer Science, vol. 5350 (Springer, 2008), pp. 108-124
    • (2008) 14Th International Conference on the Theory and Application of Cryptology and Information Security , vol.5350 , pp. 108-124
    • Ouafi, K.1    Overbeck, R.2    Vaudenay, S.3
  • 53
    • 70349118926 scopus 로고    scopus 로고
    • In Mutual Authentication in RFID: Security and Privacy
    • Alexandria, VA, USA, 27-31 Oct 2008, Computer and Communications Security, ACM Press
    • R.-I. Paise, S. Vaudenay, in Mutual Authentication in RFID: Security and Privacy. ASIACCS’ 08: Proceedings of the 2008 ACM Symposium on Information, Alexandria, VA, USA, 27-31 Oct 2008, Computer and Communications Security (ACM Press, 2008), pp. 292-299
    • (2008) ASIACCS’ 08: Proceedings of the 2008 ACM Symposium on Information , pp. 292-299
    • Paise, R.-I.1    Vaudenay, S.2
  • 55
    • 33749998666 scopus 로고    scopus 로고
    • An Improved LPN Algorithm. Security and Cryptography for Networks
    • Maiori, Italy, 6-8 Sept, Proceedings. Lecture Notes in Computer Science, (Springer
    • É. Levieil, P.-A. Fouque, in An Improved LPN Algorithm. Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, 6-8 Sept 2006, Proceedings. Lecture Notes in Computer Science, (Springer, 2006), pp. 348-359
    • (2006) 5Th International Conference, SCN 2006 , pp. 348-359
    • Levieil, É.1    Fouque, P.-A.2
  • 59
    • 35048904109 scopus 로고    scopus 로고
    • Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
    • Aizu-Wakamatsu City, Japan, Proceedings. Lecture Notes in Computer Science, (Springer, 2004)
    • J. Saito, J.-C. Ryou, K. Sakurai, in Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. International Conference on Embedded and Ubiquitous Computing (EUC), Aizu-Wakamatsu City, Japan, Aug 2004, Proceedings. Lecture Notes in Computer Science, vol. 3207 (Springer, 2004), pp. 879-890
    • (2004) International Conference on Embedded and Ubiquitous Computing (EUC) , vol.3207 , pp. 879-890
    • Saito, J.1    Ryou, J.-C.2    Sakurai, K.3
  • 60
    • 23944443170 scopus 로고    scopus 로고
    • Optical Fault Induction Attacks
    • Redwood Shores, CA, USA, 13-15, Revised Papers. Lecture Notes in Computer Science, (Springer Verlag, 2002)
    • S.P. Skorobogatov, R.J. Anderson, in Optical Fault Induction Attacks. 4th InternationalWorkshop on Cryptographic Hardware and Embedded Systems (CHES 2002), Redwood Shores, CA, USA, 13-15 Aug 2002, Revised Papers. Lecture Notes in Computer Science, vol. 2523 (Springer Verlag, 2002), pp. 31-48
    • (2002) 4Th Internationalworkshop on Cryptographic Hardware and Embedded Systems (CHES 2002) , vol.2523 , pp. 31-48
    • Skorobogatov, S.P.1    Anderson, R.J.2
  • 62
    • 79957448250 scopus 로고    scopus 로고
    • Sony Global. Web site of Sony FeliCa. http://www.sony.net/Products/felica/, June 2008
    • (2008) Web Site of Sony Felica
  • 64
    • 33750290259 scopus 로고    scopus 로고
    • In YA-TRAP: Yet Another Trivial RFID Authentication Protocol
    • Pisa, Italy, 13-17 Mar 2006. Lecture Notes in Computer Science, IEEE Computer Society
    • G. Tsudik, in YA-TRAP: Yet Another Trivial RFID Authentication Protocol. Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Pisa, Italy, 13-17 Mar 2006. Lecture Notes in Computer Science, vol. 2802 (IEEE Computer Society, 2006), pp. 640-643
    • (2006) Proceedings of the 4Th Annual IEEE International Conference on Pervasive Computing and Communications Workshops , vol.2802 , pp. 640-643
    • Tsudik, G.1
  • 65
    • 33745654539 scopus 로고    scopus 로고
    • In RFID-Tags for Anti-counterfeiting. The Cryptographers’ Track at the RSA Conference, San Jose, CA, USA, 13-17
    • (Springer, 2006)
    • P. Tuyls, L. Batina, in RFID-Tags for Anti-counterfeiting. The Cryptographers’ Track at the RSA Conference, San Jose, CA, USA, 13-17 Feb 2006, Proceedings. Lecture Notes on Computer Science, vol. 3860 (Springer, 2006), pp. 115-131
    • (2006) Proceedings. Lecture Notes on Computer Science , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 68
    • 21144438831 scopus 로고    scopus 로고
    • In Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Germany, 12-14, Revised Papers. Lecture Notes in Computer Science, (Springer, 2003)
    • S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, in Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. 1st International Conference on Security in Pervasive Computing, Boppard, Germany, 12-14 Mar 2003 Revised Papers. Lecture Notes in Computer Science, vol. 2802 (Springer, 2003), pp. 50-59
    • (2003) 1St International Conference on Security in Pervasive Computing, Boppard , vol.2802 , pp. 50-59
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.