Authentication Protocol of Private Code-based for Advanced Security of RFID System |
Jang, Bong-Im
(한남대학교 멀티미디어학과)
Kim, Yong-Tae (한남대학교 멀티미디어학과) Jeong, Yoon-Su (충북대학교 전자계산학과 네트워크 보안연구실) Park, Gil-Cheol (한남대학교 멀티미디어학과) |
1 | 김대중, 전문석, "일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계", 정보과학회논문지:정보통신 제35권 제3호, pp.246-247, 2008. 과학기술학회마을 |
2 | Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador and Arturo Ribagora, "RFID Systems: A Survey on Security Threats and Proposed Solutions", PWC 2006, LNCS 4217, pp.159-170, 2006. |
3 | Erol Ozan and Gaetan Hains, "Development of a Framework for the Enterprise RFID Defense System Architecture", Technical Report TR- LACL-2009-1, Laboratory of Algoritlunics, Complexity and Logic(LACL) University Paris 12(Paris Est), pp.1-14, 2009. |
4 | Klaus Finkenzeller, RFID Handbook, Second Edition, John Wiley& Sons, 2003. |
5 | A. Mitrokotsa, M. R. Rieback, and A. S. Tanenbaum, "Classification of RFID Attacks", Proc. Int'l Workshop on RFID Technology, pp.73-86, 2008. |
6 | 정재영, 여준호, 이형섭, 표철식, "센서 태그 기술 동향", 전자통신동향분석 제22권 제3호, pp.38-45, 2007. |
7 | S. E. Sarma, S. A. Weis and D. W. Engels, "RFID systems, security & privacy implications", Cryptographic Hardware and Embedded Systems-CHES 2002, LNCS 2523, pp.454-469, 2003. |
8 | S. Sarma, S. Weis and D. Engels, "Radio-Frequency identification: security Risks and Challenges", RSA Laboratories Cryptobytes, Vol.6, No.1, pp.2-9, 2003 . |
9 | A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal on Selected Areas in Communications, Vol. 24, Issue: 2, pp.381-394, 2006. DOI ScienceOn |
10 | Stephen A. Weis, Sanjay E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", Security in Pervasive Computing 2003, LNCS 2802, pp.201-212, 2004. |
11 | G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem", In Proceeding of the Financial Cryptography '05 - FC'05, LNCS 3570, pp.125-140, 2005. |