1 |
Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment," SPC 2005, LNCS 3450, pp. 70-84, 2005
|
2 |
Tassos Dimitriou, "A Second and Efficient RFID Protocol that could make Big Brother (partially) Obsolete," PERCOM06, IEEE, 2006
|
3 |
Christy Chatmon, Tri van Le and Mike Burmester, "Secure Anonymous RFID Authentication Protocols" Technical Report TR-060112, Florida State University, Department of Computer Science, 2006
|
4 |
Dirk Henrici and Paul Muller, "Hash-based Enhancement of Location Privacy for RadioFrequency Identification Devices using Varying Identifiers," PERCOMW'04, IEEE, 2004
|
5 |
하재철, 하정훈, 박제훈, 김환구, 문상재, "분산환경에 적합한 저비용 RFID 인증 프로토콜," 한국정보보호학회 하계 학술대회 2007, Vol. 17,pp. 78-83, 2007
|
6 |
N.W. Lo and Kuo-Hui Yeh, "Novel RFID Authentication Schemes for Security Enhancement and System Efficiency," SDM 2007, LNCS 4721, pp. 203-212, 2007
|
7 |
Andrei Broder and Michael Mitzenmacher, "Network Applications of Bloom Filters: A Survey," Internet mathematics, Vol. 1, pp. 485-509, 2004
DOI
|
8 |
JaeCheol Ha, JungHoon Ha, SangJae Moon, and Colin Boyd, "LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System," ICUCT 2006, LNCS 4412, pp. 80-89, 2007
|
9 |
Stephen A. Weis, Sanjay E. Sanna, Ronald L. Rivest, and Daniel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasice Computing 2003, LNCS 2802, pp. 201-212, 2004
|
10 |
Gene Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol," PERCOMW'06, IEEE, 2006
|
11 |
Jang-Su Park and Im-Yeong Lee, "RFID Authentication Protocol Using ID Synchronization in Insecure Communication," ICHIT'06, IEEE,2006
|
12 |
Pedro Peris-Lopez, Julio Cesar HemandezCastro, Juan M. Estevez-Tapiador, and Arturo Ribagora, "RFID Systems: A Survey on Security Threats and Proposed Solutions," PWC 2006, LNCS 4217, pp. 159-170, 2006
|
13 |
Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, and Jong In Lim, "Efficient Authentication for Low-Cost RFID Systems," ICCSA 2005, LNCS 3480, pp. 619-627, 2005
|
14 |
Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, "Cryptographic Approach to PrivacyFriendly Tags," RFID Privacy Workshop, Nov 2003
|
15 |
Song Han, Vidyasagar Potdar, and Elizabeth Chang, "Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Infonnation with Monitor," ICCSA 2007, LNCS 4707, pp. 227-238, 2007
|
16 |
Sangshin Lee, Tomoyuki Asano, Kwangjo Kim, "RFID Mutual Authentication Scheme based on Synchronized Sectet Infonnation," SCIS 2006, IEICE, 2006
|
17 |
하재철, 박제훈, 윤신숙, 김환구, 문상재, " 경량화된 RFID 상호 인증 프로토콜 제안," 한국정보보호학회 동계학술대회 2007, Vol. 17, No.2, pp. 331-336, 2007
|
18 |
Tassos Dimitriou, "A Lightweight RFID Protocol to protect against Traceability and Cloning attacks," SECURECOMM'05, IEEE, 2005
|
19 |
Stephen August Weis, "Security and Privacy in Radio-Frequency Identification Devices," Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Science in Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY, May 2003
|