1 |
하재철, 백이루, 김환구, 박제춘, 문상재, '해쉬함수에 기반한 경량화된 RFID 인증 프로토콜,' 정보보호학회논문지, 19(3), pp. 61-72, 2009년 6월
|
2 |
M. Burmester, B. Medeiros, and R. Motta, 'Provably Secure GroupingProofs for RFID Tags.' CARDIS. LNCS 5189, pp. 176-190, 2008
|
3 |
T. Karygiannis, B. Eydt, G. Barber, L. Bunn, and T. Phillips, 'Guidelines for Securing Radio .Frequency Identification (RFID) Systems,' National Institute of Standards and Technology(NIST) Special Publication 800-98, p. 154, Apr. 2007
|
4 |
'Radio Frequency Identification (RFID): A Focus on Information Security and Privacy,' OECD Working Party on Information Security and Privacy, DSTI/ICCP/REG(2007)9/FINAL, p. 70. Jan. 2008
|
5 |
G. Tsudik, 'YA-TRAP: Yet Another Trivial RFID Authentication Protocol,' Pervasive Computing and Communications(PerCom) Workshops, pp. 640-643, Mar. 2006
DOI
|
6 |
S.l. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, 'S3PR : Secure Serverless Search Protocols for RFID,' Information Security and Assurance (ISA), pp. 187-192, Apr. 2008
DOI
|
7 |
M. Feldhofer and J. Wolkerstorfer, 'Strong crypto for RFID tags-A comparison of low-power hardware implementations,' IEEE International Symposium on Circuits and Systems GSCAS), pp. 1839 -1842, May 2007
|
8 |
R. Paise and S. Vaudenay, 'Mutual authentication in RFID: security and privacy,' ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 292-299, Mar. 2008
DOI
|
9 |
원태연, 천지영, 박춘식, 이동훈, '수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계,; 정보보호학회논문지, 18(6A), pp. 63-73, 2008년 12월
|
10 |
권혜진, 이재욱, 전동호, 김순자, '데이터베이스에서의 태그 검색이 쉽고 안전한 RFID 상호인증 프로토콜,' 정보보호학회논문지, 18(5), pp. 125-134, 2008년 10월
과학기술학회마을
|
11 |
H.Y. Chien and T.C. Wu. 'Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denialof- Service Attacks.' 정보보호학회논문지, 18(6B), pp. 259-269. 2008년 12월
|
12 |
H. Gilbert, M. Robshaw, and Y. Seurin, 'HB#: Increasing the Security and Efficiency of HB+,' Advances in Cryptology-EUROCRYPT, LNCS 4965, pp. 361-378, 2008
|
13 |
정윤수, 김용태, 박길철, 이상호, 'RFID를 이용한 IPTV 사용자의 경량화 인증 프로토콜,' 정보보호학회논문지, 19(2), pp. 105-115, 2009년 4월
|
14 |
M. Ohkubo, K. Suzuki, and S. Kinoshita, 'Cryptographic Approach to 'privacyFriondly' Tags,' In RFID Privacy Workshop, Nov. 2003
|
15 |
C. Tan, B. Sheng, and Q. Li, 'Serverless Search and Authentication Protocols for RFID,' Pervasive Computing and Communications(PerCom) Workshops, pp. 3-12, Mar. 2007
|
16 |
S. Vaudenay, 'On Privacy Models for RFID,' Advances in Cryptology- ASIACRYPT, LNCS 4833, pp. 68-87, 2007
|
17 |
A. Juels and S.A. Weis, 'Authenticating Pervasive Devices with Human Protocols,' Advances in Cryptology- Crypto, LNCS 3621, pp. 293-308, 2005
|
18 |
C.C.Tan, B. Sheng, and Q. Li, 'Secure and Serverless RFlD Authentication and Search Protocols,' IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1400-1407, Apr. 2008
DOI
ScienceOn
|