최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국통신학회논문지. The Journal of Korea Information and Communications Society. 통신이론 및 시스템, v.33 no.2C, 2008년, pp.208 - 218
김수철 (중앙대학교 컴퓨터공학부 알고리즘 및 정보보호 연구실) , 여상수 (큐슈대학교 정보공학부) , 김성권 (중앙대학교 컴퓨터공학부 알고리즘 및 정보보호 연구실)
We are sure that RFID system should be a widely used automatic identification system because of its various advantages and applications. However, many people know that invasions of privacy in RFID system is still critical problem that makes it difficult to be used. Many works for solving this proble...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
K. Finkenzeller, RFID Handbook, John Wiley& Sons, 2002
조정식, 여상수, 김성권, "RFID tag를 위한 강 력한 Yoking Proof Protocol", 한국통신학회논문지, 32(3) , pp.310-318, March 2006
S. Sarma and S. Weis and D. Engels, "Radio-Frequency identification: security Risks and Challenges", In Cryptobytes, Vol.6, No.1, pp.2-9, RSA Laboratories, Spring 2003
G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem", In Proceeding of the Financial Cryptography '05 - FC'05, Vol.3570 of LNCS, pp.125-140, February 2005
R. Anderson and M. Kuhn, "Low cost attacks on tamper resistant devices", Proceeding of the International Workshop on Security Protocols - IWSP, Vol.1361 of LNCS, pp.125-135, April 1997
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", Springer-Verlag, International Conference on Security in Pervasive Computing - SPC 2003, LNCS, Vol 2802, pp.454-469, 2004
P. Golle and M. Jakobsson and A. Juels and P. Syverson, "Universal Re-Encryption for Mixnets", Proceedings of the The Cryptographers' Track at the RSA Conference - CT-RSA '04, Vol.2964 of LNCS, pp 163-178, February 2004
A. Juels and Rivest and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy", Proceeding of the Conference on Computer and Communications Security - ACM CCS 2003, ACM, pp.103-111, October 2003
G. Avoine, "Adversarial Model for RFID Frequency Identification", Cryptology ePrint Archive, Report 2005/049, 2005
M. Rieback and B. Crispo and A. Tanenbuam, "RFID Guardian; A battery-powered mobile device for RFID privacy management", Proceedings of the Australasian Conference on informaiton Security and Privacy - ACISP 2005, Vol.3574 of LNCS, pp.184-194, July 2005
S. Konomi, "Personal Privacy Assistants for RFID Users", Proceedings of the International Workshop Series on RFID 2004, November 2004
A. Juels and P. Syverson and D. Bailey, "High-Power Proxies for Engancing RFID Privacy and Utility", Proceedings of the Center for High Assurance Computer Systems - CHACS 2005, August 2005
S.C. Kim and S.S. Yeo and S.K. Kim, "MARP: Mobile Agent for RFID Privacy Protection", International Conference on Smart Card Research and Advanced Applications - CARDIS'06, pp.300-312, April 2006
※ AI-Helper는 부적절한 답변을 할 수 있습니다.