1 |
S.A Weis, S.B. Sarma, R.L. Rivest, and D.W. Engels. "Sercurity and Privacy Aspects of Low-Cost Radio Frequency Identification System.", In Security in Pervasive Comp., Vol. 2802 of LNCS, pp. 201-212. 2004
|
2 |
박규진, 한경헌, 성종엽, 유도경, 최동유, 한승조. "RFID Tag의 인증을 통한 보안성 향상", 정보보호학회 하계학술대회, 2009. 06
|
3 |
G. Avoine, E. Dysli, and P. Oeschslin, "Reducing time Complexity in RFID systems", In The 12th Annual Workshop on Selected Areas in Cryptography. 2005
|
4 |
K. Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-reponse based RFID Authentication Protocol for Distributed Database Environment", In International Conferences on Security in Pervasive Computing. pp.70. 2005
|
5 |
M. Ohkuho, K. Suzki. and S. Kinoshita, "Cryptographic Approach to 'Privacy- Triendly' Tags", In RFID Privacy Workshop. 2003
|
6 |
S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. "Sercurity and Privacy Aspects of Low-Cost Radio Frequency Identification System.", In Security in Pervasive Comp., Vol. 2802 of LNCS, pp. 201-212. 2004
|
7 |
H.Y. Chien, "Secure Access Control Schemes for RFID System with Anonymity", In Proceedings of 1005 national Workshop on Future Mobile and Ubiquitous Information Technologies. 2006
|
8 |
J. Yang, J. Park, and K. Kim "Security and Privacy on Authentication Protocol for Low-Cost Radio", In The 2005 Symposium on Cryptography and Information Security. 2005
|
9 |
김현. "Analysis of RFID Authentication Protocl", In KISA Report. 2006
|
10 |
D. Molnar and D. Wanger, "Privacy and Security in Library RFID: Issues, Pratices, and Archtiectures." In Conference on Computer and Communication Security. pp.210. 2004
|
11 |
J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, "Mutual Authentication Protocol for Low-Cost RFID", Handout of the Ecrypt Workshop on RFID and Lightweight Crypto. 2005
|