최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국콘텐츠학회논문지 = The Journal of the Korea Contents Association, v.21 no.2, 2021년, pp.113 - 120
함형민 (배재대학교 사이버보안학과)
RFID (Radio Frequency Identification) yoking authentication provides methods scanning a pair of RFID tags with a reader device and verifying them to ensure the physical proximity of objects. In the first yoking proof protocols, a verifier connected to a reader device online is essential to verify th...
A. Juels, "Yoking proofs for RFID tags," Proceedings of the 2nd IEEE Annual Conference on Computing and Communication Workshops, pp.138-143, 2008.
J. Saito and K. Sakurai, "Grouping proof for RFID tags," Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Vol.2, pp.621-624, 2005.
S. Piramuthu, "On existence proofs for multiple RFID tags," Proceeding of ACS/IEEE International Conference on Pervasive Services, pp.317-320, 2005.
L. Bolotnyy and G. Robins, "Generalized yoking proofs for a group of RFID tags," Proceeding of the 3rd International Conference on Mobile and Ubiquitous Systems Workshops, pp.1-4, 2006.
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags," Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp.55-60, 2007.
J. S. Cho, S. S. Yeo, S. C. Hwang, S. Y. Rhee, and S. K. Kim, "Enhanced yoking proof protocols for RFID tags and tag groups," Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops, WAINA'08, pp.1591-1596, 2008.
Y. Lien, X. Leng, K. Mayes, and J. Chiu, "Reading order independent grouping proof for RFID tags," Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp.128-136, IEEE, 2008.
M. Burmester, B. Medeiros, and R. Motta, "PrOFF-Vably secure grouping proofs for RFID tags," Proceedings of the 8th IFIP international conference on Smart Card Research and Advanced Applications, pp.176-190, Springer Verlag, Berlin, Heidelberg, 2008.
P. Peris-Lopez, A. Orfila, J. C. Hernandez-Castro, Vander Lubbe, and C. A. Jan, "Flaws on RFID Grouping-Proofs," Guidelines for Future Sound, J. Netw. Comput. Appl, Vol.4, No.3, pp.833-845, 2011.
Yang, Ming-Hour, Luo, Jia, Lu, Shao, "A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme," Sensors, Vol.15, No.10, MDPI, 2015.
Z. Shi, X. Zhang, and J. Liu, "The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security," Wireless Communications and Mobile Computing, Article ID 8436917, 2020.
Hong Liu, Huansheng Ning, Yinliang Yue, Yueliang Wan, and Laurence T. Yang, "Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices," Future Generation Computer Systems, Vol.78, Part.3, pp.976-986, 2018.
Wei Zhang, Shiming Qin, Shengming Wang, Longkai Wu, and Baolin Yi, "A New Scalable Lightweight Grouping Proof Protocol for RFID systems," Wireless Personal Communications, Vol.103, pp.133-143, 2018.
Z. Zhou, P. Liu, Q. Liu, and G. Wang, "An Anonymous Offline RFID Grouping-Proof Protocol," Future Internet, Vol.10, No.1, p.2, 2018.
"EPCglobal class1 gen2 RFID specifications," Whitepaper, 2008
K. Finkenzeller, "RFID Handbook, Fundamentals and Applications in Contactless Smart Cards and Identification," John Wiley and Sons Ltd,, pp.226-232, 2003.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.