1 |
O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
|
2 |
Hwa-jeon Seo, et al, "IoT Security Technical Trend", Korean Institute of Electromagnetic Engineering Society, Vol. 24, No. 4, pp. 27-35, 2013, 7.
DOI
|
3 |
P. de Leusse, P. Periorellis, T. Dimitrakos, and S.K. Nair, "Self managed security cell, a security model for the internet of things and services", In Advances in Future Internet, 2009 First International Conference on, pp. 47-52, 2009.
|
4 |
D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device," In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), pp. 46-59, 2006.
|
5 |
Jin-seob Shin, Young-ho Park, "An Authentication Protocol using the EXOR and the Hash Function in RFID/USN," Korea Society of Industrial Information Systems, Vol. 12, No. 2, pp.24-29, 2007. 6.
|
6 |
Hae-Soon Ahn, Ki-Dong Bu, "Improved Authentication Protocol for RFID/USN Environment," The Institute of Electronics and Information Engineers, Vol.46, No. CI-1, 2009.
|
7 |
O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
|
8 |
D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), pp. 19-31, 2011.
|
9 |
http://www.opnet.com
|
10 |
Taeyang Eom, Jeong-Hyun, "Performance Evaluation of Authentication Protocol for Mobile RFID Privacy", Korean Institute of Communication and Information Sciences, Vol. 36, No 6, 2011. 6.
|