References
- C.C. Tan, B. Sheng, and Q. Li, 'Secure and Serverless RFID Authentication and Search Protocols,' IEEE Transactions on Wireless Communications, volume 7(3), pages 1400-1407, 2008 https://doi.org/10.1109/TWC.2008.061012
- A. Juels and S. Weis, 'Defining Strong Privacy for RFID,' Cryptology ePrint Archive, Report 2006/137, 2006
- K. Rhee, J. Kwak, S. Kim, and D. Won, 'Challenge-response based RFID authentication protocol for distributed database environment,' Proc. of the SPC 2005, volume 3450 of LNCS, pages 70-84, Springer-Verlag, 2005
- S.A. Weis, S. Sarma, R. Rivest, and D. Engels, 'Security and privacy aspects of low-cost radio frequency identification systems,' Proc. of the SPC 2003, volume 2802 of LNCS, pages 201-212, Springer-Verlag, 2004
- C. Lim and T. Kwon, 'Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer,' Proc. of the ICICS 2006, volume 4307 of LNCS, pages 1-20, Springer-Verlag, 2006 https://doi.org/10.1007/11935308_1
- S. Vaudenay, 'On Privacy Models for RFID,' Proc. of the Asiacrypt 2007, volume 4833 of LNCS, pages 68-87, Springer-Verlag, 2007 https://doi.org/10.1007/978-3-540-76900-2_5
- P.I. Paise and S. Vaudenay, 'Mutual Authentication in RFID: Security and Privacy,' Proc. of the CCS 2008, pages 292-299, ACM, 2008 https://doi.org/10.1145/1368310.1368352
- T. Dimitriou, 'A Lightweight RFID protocol to protect against traceability and cloning attack,' Proc. of the SecureComm 2005, pages 59-66, 2005 https://doi.org/10.1109/SECURECOMM.2005.4
- S. Lee and Y. Hwang, 'Efficient authentication for low-cost RFID systems,' Proc. of the ICCSA 2005, volume 3480 of LNCS, pages 619-629, Springer-Verlag, 2005 https://doi.org/10.1007/11424758_65
- M. Ohkubo, K. Suzuki, and S. Kinoshita, 'Efficient hash-chain based RFID privacy protection scheme,' Proc. of the Ubicomp, 2004
- J. Lim, S. Kim, and H. Oh, 'A New Hash-base RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection,' Proc. of the ISPEC 2008, volume 4991 of LNCS, pages 278-289, Springer-Verlag, 2008 https://doi.org/10.1007/978-3-540-79104-1_20
- S. Kim, J. Lim, J. Han, and H. Oh, 'Efficient RFID Search Protocols Using Counters,' IEICE Transactions on Communications, volume E91-B(11), pages 3552-3559, 2008 https://doi.org/10.1093/ietcom/e91-b.11.3552
- G. Avoine, 'Adversarial Model for Radio Frequency Identification,' Cryptology ePrint Archive, Report 2005/049, 2005
- M. Bellare, P. Rogaway, 'Random Oracles are Practical: A Paradigm for Designing Efficient Protocols,' Proc. of the CCS 1993, pages 62-73, ACM, 1993 https://doi.org/10.1145/168588.168596
Cited by
- An Efficient Anonymous Authentication Protocol Based on Multiple Anonymous Certificates in VANET vol.16C, pp.5, 2009, https://doi.org/10.3745/KIPSTC.2009.16C.5.589