DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dang, DN | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2013-03-08T16:07:36Z | - |
dc.date.available | 2013-03-08T16:07:36Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2010-03 | - |
dc.identifier.citation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, pp.528 - 530 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.uri | http://hdl.handle.net/10203/93519 | - |
dc.description.abstract | A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack. | - |
dc.language | English | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | On the Security of RFID Group Scanning Protocols | - |
dc.type | Article | - |
dc.identifier.wosid | 000276759500015 | - |
dc.identifier.scopusid | 2-s2.0-77950199725 | - |
dc.type.rims | ART | - |
dc.citation.volume | E93D | - |
dc.citation.beginningpage | 528 | - |
dc.citation.endingpage | 530 | - |
dc.citation.publicationname | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.identifier.doi | 10.1587/transinf.E93.D.528 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Dang, DN | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | yoking-proof | - |
dc.subject.keywordAuthor | grouping-proof | - |
dc.subject.keywordAuthor | co-existence-proof | - |
dc.subject.keywordAuthor | relay attack | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.