Acknowledgement
Supported by : 한국연구재단
References
- C.C. Tan, B. Sheng, and Q. Li, "Secure and Serverless RFID Authentication and Search Protocols," IEEE Transactions on Wireless Communications, vol. 7, no. 3, pp. 1400-1407, Apr. 2008. https://doi.org/10.1109/TWC.2008.061012
- A. Bogdanov, G. Leander, C. Paar, and A. Poschmann, "Hash Functions and RFID Tags: Mind the Gap," Proc. of the CHES08, LNCS 5154, pp. 283-299, 2008.
- A. Juels and S.A. Weis, "Authenticating Pervasive Devices with Human Protocols," Proc. of the CRYPTO05, LNCS 3126, pp. 293-308, 2005.
- M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm," Proc. of the CHES04, LNCS 3156, pp. 85-140, 2004.
- S.I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, "S3PR: Secure Serverless Search Protocols for RFID," Proc. of the ISA08, pp. 187-192, Apr. 2008.
- T. Won, J. Chun, and D. Lee, "Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database," Proc. of the EUC, pp. 153-158, Dec. 2008.
- 임지환, 오희국, 양대헌, 이문규, 김상진, "강화된 사용자 프라이버시를 보장하는 효율적인 RFID 검색 프로토콜," 정보처리학회논문지, 16-C(3), pp. 347-356, 2009년 6월. https://doi.org/10.3745/KIPSTC.2009.16-C.3.347