메뉴 건너뛰기




Volumn , Issue , 2008, Pages 127-156

RFID specification revisited

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85130015071     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (13)

References (48)
  • 2
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification (RFID)
    • C.M. Roberts. Radio frequency identification (RFID). Computers and Security, 25(1):18-26, 2006.
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 18-26
    • Roberts, C.M.1
  • 4
  • 5
    • 33750291916 scopus 로고    scopus 로고
    • RFID systems: A survey on security threats and proposed solutions
    • of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • P. Peris-Lopez, J. Cesar Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda. RFID systems: A survey on security threats and proposed solutions. In Proc. of PWC06, vol. 4217 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 159-170, 2006.
    • (2006) In Proc. of PWC06 , vol.4217 , pp. 159-170
    • Peris-Lopez, P.1    Cesar Hernandez-Castro, J.2    Estevez-Tapiador, J.3    Ribagorda, A.4
  • 6
    • 85130066869 scopus 로고    scopus 로고
    • February 5
    • EPCglobal. http://www.epcglobalinc.org/. February 5, 2006.
    • (2006)
  • 8
    • 85130070936 scopus 로고    scopus 로고
    • Class-1 Generation-2 UHF air interface protocol standard, version 1.0.9
    • January
    • Class-1 Generation-2 UHF air interface protocol standard, version 1.0.9: "Gen-2." http://www.epcglobalinc.org/, January 2005.
    • (2005) Gen-2
  • 10
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • September
    • M. Weiser. The computer for the 21st century. Scientific American, 265(3):94-104, September 1991.
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 11
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Proc. of SPC'03, vol. 2802 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 454-469, 2003.
    • (2003) Proc. of SPC'03 , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 12
    • 33744907692 scopus 로고    scopus 로고
    • Low-cost RFID systems: Confronting security and privacy
    • Zurich, Switzerland, September
    • D. Ranasinghe, D. Engels, and P. Cole. Low-cost RFID systems: Confronting security and privacy. In Auto-ID Labs Research Workshop, Zurich, Switzerland, September, 2004.
    • (2004) Auto-ID Labs Research Workshop
    • Ranasinghe, D.1    Engels, D.2    Cole, P.3
  • 13
    • 34548830043 scopus 로고    scopus 로고
    • A case against currently used hash functions in RFID protocols
    • Graz, Austria, July
    • M. Feldhofer and C. Rechberger. A case against currently used hash functions in RFID protocols. In Proc. of RFIDSec'06, Graz, Austria, July 2006.
    • (2006) Proc. of RFIDSec'06
    • Feldhofer, M.1    Rechberger, C.2
  • 14
    • 58449108949 scopus 로고    scopus 로고
    • Universal hash functions for emerging ultralow-power networks
    • San Diego, CA, January
    • K. Yksel, J.P. Kaps, and B. Sunar. Universal hash functions for emerging ultralow-power networks. In Proc. of CNDS'04, San Diego, CA, January 2004.
    • (2004) Proc. of CNDS'04
    • Yksel, K.1    Kaps, J.P.2    Sunar, B.3
  • 23
    • 38149014373 scopus 로고    scopus 로고
    • Grain-a stream cipher for constrained enviroments
    • 2005, Graz, Austria, July
    • M. Hell, T. Johansson, and W. Meier. Grain-a stream cipher for constrained enviroments. In Proc. of RFIDSec'05, 2005, Graz, Austria, July, 2005.
    • (2005) Proc. of RFIDSec'05
    • Hell, M.1    Johansson, T.2    Meier, W.3
  • 24
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Proc. of Security in Pervasive Comp., vol. 2802 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 201-212, 2004.
    • (2004) Proc. of Security in Pervasive Comp , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 25
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • ACM, ACM Press, New York, October
    • D. Molnar and D. Wagner. Privacy and security in library RFID: issues, practices, and architectures. In Proc. of ACM CCS'04, pp. 210-219. ACM, ACM Press, New York, October 2004.
    • (2004) Proc. of ACM CCS'04 , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 27
    • 54349126955 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • Pisa, Italy
    • T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proc. of PerCom'06, Pisa, Italy, 2006.
    • (2006) Proc. of PerCom'06
    • Dimitriou, T.1
  • 29
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-response based RFID authentication protocol for distributed database environment. In Proc. of SPC'05, vol. 3450 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 70-84, 2005.
    • (2005) Proc. of SPC'05 , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 30
    • 85019495228 scopus 로고    scopus 로고
    • YA-TRAP: Yet another trivial RFID authentication protocol
    • Pisa, Italy
    • G. Tsudik. YA-TRAP: Yet another trivial RFID authentication protocol. In Proc. of PerCom'06, Pisa, Italy, 2006.
    • (2006) Proc. of PerCom'06
    • Tsudik, G.1
  • 31
    • 2942623480 scopus 로고    scopus 로고
    • RFID systems and security and privacy implications
    • Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • S.E. Sarma, S.A. Weis, and D.W. Engels. RFID systems and security and privacy implications. In Proc. of CHES'02, vol. 2523 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 454-470, 2002.
    • (2002) Proc. of CHES'02 , vol.2523 , pp. 454-470
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 32
    • 33744940544 scopus 로고    scopus 로고
    • Efficient RFID authentication protocol for ubiquitous computing environment
    • Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • E.Y. Choi, S.M. Lee, and D.H. Lee. Efficient RFID authentication protocol for ubiquitous computing environment. In Proc. of SECUBIQ'05, vol. 3823 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 945-954, 2005.
    • (2005) Proc. of SECUBIQ'05 , vol.3823 , pp. 945-954
    • Choi, E.Y.1    Lee, S.M.2    Lee, D.H.3
  • 33
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • IEEE Computer Society, Washington, D.C
    • D. Henrici and P. Müller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Proc. of PERSEC'04, pp. 149-153. IEEE Computer Society, Washington, D.C., 2004.
    • (2004) Proc. of PERSEC'04 , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 34
    • 24944582157 scopus 로고    scopus 로고
    • Efficient authentication for low-cost RFID systems
    • Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • S.M. Lee, Y.J. Hwang, D.H. Lee, and J.I.L. Lim. Efficient authentication for low-cost RFID systems. In Proc. of ICCSA'05, vol. 3480 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 619-627, 2005.
    • (2005) Proc. of ICCSA'05 , vol.3480 , pp. 619-627
    • Lee, S.M.1    Hwang, Y.J.2    Lee, D.H.3    Lim, J.I.L.4
  • 37
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • A. Juels. Minimalist cryptography for low-cost RFID tags. In Proc. of SCN'04, vol. 3352 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 149-164, 2004.
    • (2004) Proc. of SCN'04 , vol.3352 , pp. 149-164
    • Juels, A.1
  • 38
    • 33644534001 scopus 로고    scopus 로고
    • Lightweight authentication protocols for low-cost RFID tags
    • Atlanta, GA
    • I. Vajda and L. Buttyán. Lightweight authentication protocols for low-cost RFID tags. In Proc. of UBICOMP'03, Atlanta, GA. 2003.
    • (2003) Proc. of UBICOMP'03
    • Vajda, I.1    Buttyán, L.2
  • 39
    • 33750067948 scopus 로고    scopus 로고
    • M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
    • Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • P. Peris-Lopez, J.C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda. M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In Proc. of UIC'06, vol. 4159 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 912-923, 2006.
    • (2006) Proc. of UIC'06 , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.3    Ribagorda, A.4
  • 40
    • 33845455482 scopus 로고    scopus 로고
    • EMAP: An efficient mutual authentication protocol for low-cost RFID tags
    • Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • P. Peris-Lopez, J.C. Hernandez-Castro, Juan M. Estevez-Tapiador, and A. Ribago-rda. EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In Proc. of IS'06, vol. 4277 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 352-361, 2006.
    • (2006) Proc. of IS'06 , vol.4277 , pp. 352-361
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 42
    • 33750018373 scopus 로고    scopus 로고
    • Shoehorning security into the EPC standard
    • of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany
    • A. Juels and D. Bailey. Shoehorning security into the EPC standard In Proc. of SCN'06, vol. 4116 of Lecture Notes in Computer Science, Springer-Verlag, Heildeberg, Germany, pp. 303-320, 2006.
    • (2006) Proc. of SCN'06 , vol.4116 , pp. 303-320
    • Juels, A.1    Bailey, D.2
  • 44
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class-1 Generation-2 standards
    • H.Y Chien and C.H Chen. Mutual authentication protocol for RFID conforming to EPC Class-1 Generation-2 standards. Computer Standards and Interfaces, 29(2):254-259, 2007.
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 46
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • ACM Press, New York
    • N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. In Proc. of MobiCom'01, ACM, ACM Press, New York, pp. 180-189, 2001.
    • (2001) Proc. of MobiCom'01, ACM , pp. 180-189
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 48
    • 85130044433 scopus 로고    scopus 로고
    • ScanSSH-Scanning the Internet for SSH servers
    • San Diego, CA, December
    • N. Provos, and P. Honeyman. ScanSSH-Scanning the Internet for SSH servers. In Proc. of USENIX'01, San Diego, CA, December 2001.
    • (2001) Proc. of USENIX'01
    • Provos, N.1    Honeyman, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.