DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, You-Sung | ko |
dc.contributor.author | Choi, Doo-Ho | ko |
dc.contributor.author | Park, Dong-Jo | ko |
dc.date.accessioned | 2013-08-08T05:44:21Z | - |
dc.date.available | 2013-08-08T05:44:21Z | - |
dc.date.created | 2013-03-19 | - |
dc.date.created | 2013-03-19 | - |
dc.date.issued | 2013-02 | - |
dc.identifier.citation | ETRI JOURNAL, v.35, no.1, pp.170 - 172 | - |
dc.identifier.issn | 1225-6463 | - |
dc.identifier.uri | http://hdl.handle.net/10203/174553 | - |
dc.description.abstract | With the rapid progress of RFID security technologies, the international standard group ISO/IEC JTC 1/SC 31 is developing a few security technologies for RFID systems. One of the initial proposals is' ISO/IEC working draft (WD) 29167-6. Recently, Song and others stated that Protocol I of ISO/IEC WD 29167-6 is vulnerable to a malicious adversary. However, their analysis' comes from a misunderstanding regarding a communication parameter called Handle. In this letter, we point out that an adversary cannot obtain any sensitive information from intervening in Protocol 1. | - |
dc.language | English | - |
dc.publisher | ELECTRONICS TELECOMMUNICATIONS RESEARCH INST | - |
dc.title | Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6 | - |
dc.type | Article | - |
dc.identifier.wosid | 000314855600023 | - |
dc.identifier.scopusid | 2-s2.0-84873615393 | - |
dc.type.rims | ART | - |
dc.citation.volume | 35 | - |
dc.citation.issue | 1 | - |
dc.citation.beginningpage | 170 | - |
dc.citation.endingpage | 172 | - |
dc.citation.publicationname | ETRI JOURNAL | - |
dc.identifier.doi | 10.4218/etrij.13.0212.0415 | - |
dc.contributor.localauthor | Park, Dong-Jo | - |
dc.contributor.nonIdAuthor | Kang, You-Sung | - |
dc.contributor.nonIdAuthor | Choi, Doo-Ho | - |
dc.description.isOpenAccess | Y | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | RFID | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | RFID security | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.