On the Security of RFID Group Scanning Protocols

Cited 3 time in webofscience Cited 0 time in scopus
  • Hit : 402
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorDang, DNko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2013-03-08T16:07:36Z-
dc.date.available2013-03-08T16:07:36Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2010-03-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, pp.528 - 530-
dc.identifier.issn0916-8532-
dc.identifier.urihttp://hdl.handle.net/10203/93519-
dc.description.abstractA RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleOn the Security of RFID Group Scanning Protocols-
dc.typeArticle-
dc.identifier.wosid000276759500015-
dc.identifier.scopusid2-s2.0-77950199725-
dc.type.rimsART-
dc.citation.volumeE93D-
dc.citation.beginningpage528-
dc.citation.endingpage530-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.identifier.doi10.1587/transinf.E93.D.528-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorDang, DN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthoryoking-proof-
dc.subject.keywordAuthorgrouping-proof-
dc.subject.keywordAuthorco-existence-proof-
dc.subject.keywordAuthorrelay attack-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 3 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0