Acknowledgement
Supported by : 정보통신산업신흥원
References
- 신진섭, 박영호, "RFID/USN에서의 EXOR과 해쉬 함수를 이용한 인증 프로토콜," 한국산업정보학회논문지, 12(2), pp. 24-29, 2007년 6월.
- 안해순, 부기동, 윤은준, 남인길, "RFID/USN 환경을 위한 개선된 인증 프로토콜," 전자공학회논문지, 46(1), pp. 1-10, 2009년 1월.
- 임지환, 오희국, 김상진, "동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜," 정보처리학회논문지, 15-C(6), pp. 469-480, 2008년 12월.
- G.Avoine, C.Lauradoux, and T.Martin, "When Compromised Readers Meet RFID." 10th International Workshop. WISA 2009, LNCS 5932, pp. 36-50, Aug. 2009.
- 하재철, 백이루, 김환구, 박제훈, 문상재, "해쉬함수에 기반한 경량화된 RFID 인증 프로토콜," 한국정보보호학회논문지, 19(3), pp. 61-72, 2009년 6월.
- S.A. Weis, S.E. Sarma, R.L. Rivest and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," First International Conference on Security in Pervasive computing, pp. 50-59, 2004.
- M. Burmester, B. Medeiros and R. Motta, "Provably Secure Grouping-Proofs for RFID Tags," Proceeding in 8th IFIP WG 8.8/11.2 International Conference (CARDIS), vol. 5189, pp. 176-190, Sep. 2008.
- E.J. Yoon, K.Y. Yoo, "Two Security Problems of RFID Security Method with Ownership Transfer," Proceeding in 2008 IFIP International Conference on Network and Parallel Computing, pp. 68-73, Oct. 2008.
- National Institute of Standards and Technology, "Guidelines for Securing Radio Frequency Identification (RFID)," Natl. Inst. Stand. Technol. Spec. Pub. 800-98, Apr. 2007.
- K.Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-Response Based RFID Authentication, Protocol for Distributed Database Environment," Proceedings of Second International Conference, SPC 2005, pp. 70-84, Apr. 2005.
- 김익수, "효율성을 고려한 해쉬 함수 기반의 안전한 RFID인증 프로토콜", 한국통신학회논문지, 34(4), pp. 428-434, 2009년 4월.
- T. Dimitriou, "A secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete," Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06), pp. 270-275, Mar. 2006.
- 김진호, 서재우, 이필중, "저비용 RFID시스템에 적합한 효율적인 인증 방법," 정보보호학회논문지, 18(2), pp. 117-128, 2008년 4월.
- T. Good, M. Benaissa, ''A low-frequency RFID to challenge security and privacy concerns," Proceedings of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS'09), pp. 856-863, Oct. 2009.
- M. Kim, J. Ryou, Y. Choi and S. Jun, "Low-cost Cryptographic Circuits for authentication in Radio Frequency Identification Systems," Proceedings of International symposium on Consumber Electronics (ISCE'06), pp. 1-5, Jun. 2007.
- M. Reldhofer, J. Wolkerstorfer, "Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations," Proceedings of IEEE International Symposium on In Circuits and Systems (ISCAS'07), pp. 1839-1842, May. 2007.
- A.Juels, R.L.Rivest, M.Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," 10th ACM Computer and Communications Security Conference (CCS'03), pp. 103-111, Oct. 2003.
- 염용진, ''RFID시스템을 위한 암호 기술 동향," 정보통신연구진흥원 학술정보-주간기술동향", 1223, 2005년 11월.
- International Telecommunication Union. "The 5th revised text on ITU-T X. usnsec-1 ISO/lEC CD 29180: Security framework for ubiquitous sensor network," ITU-T SG17, 942-PLEN, Apr. 2010.
- International Telecommunication Union, "Threats and requirements for protection of personally identifiable information in applications using tag-based identification," ITU-T SG17, X.1171, Feb. 2009.