正在加载图片...
3期 谢磊等:RFD数据管理:算法、协议与性能评测 469 Symposium on Mobile Ad Hoc Networking and Computing on Research in Computer Security(ESORICS'06).Hamburg, (MobiHoc'08).Hong Kong,China,2008:159-168 Germany,2006:479-495 [19] Kodialam M,Nandagopal T,Lau W.Anonymous tracking [33]Tan CC,Li Q,Xie L.Privacy protection for RFID-based using RFID tags//Proceedings of the 26th Annual Joint Con- tracking systems//Proceedings of the IEEE International ference of the IEEE Computer and Communications Societies Conference on RFID.Orlando,USA,2010:53-60 (INFOCOM'07).Anchorage,USA,2007:1217-1225 [34]Poschmann A,Leander G,Schramm K,Paar C.New light [20]Li T.Chen S,Ling Y.Identifying the missing tags in a large weight crypto algorithms for RFID//Proceedings of the IEEE RFID system//Proceedings of the 11th ACM Interational International Symposium on Circuits and Systems(ISCAS'07). Symposium on Mobile Ad Hoc Networking and Computing New Orleans,USA,2007:1843-1846 (MobiHoe'10).Chicago,USA,2010:1-10 [35] Hong D,Sung J,Hong S,Lim J,Lee S,Koo B,Lee C, [21]Qiao Y,Chen S,Li T,Chen S.Energy-efficient polling Chang D,Lee J,Jeong K,Kim H,Kim H,Chee S. protocols in RFID systems//Proceedings of the 12th ACM HIGHT:A new block cipher suitable for low-resource Interational Symposium on Mobile Ad Hoc Networking and device//Proceedings of the 8th International Workshop on Computing(MobiHoc'11).Paris,France,2011:25 Cryptographic Hardware and Embedded Systems(CHES'06). [22]Chen S,Zhang M,Xiao B.Efficient information collection Yokohama,Japan,2006:46-59 protocols for sensor-augmented RFID networks//Proceedings [36]Sarma S E,Weis S A,Engels D W.Radio frequency identifi- of the 30th Annual Joint Conference of the IEEE Computer cation:Secure risks and challenges.RSA Laboratories Cryp- and Communications Societies (INFOCOM'11).Shanghai, tobytes,.2003,6(1):2-9 China,2011:3101-3109 [37] Weis S A,Sarma S E,Rivest R L,Engels D W.Security [23]Yang L,Han J,Qi Y,Liu Y.Identification-free batch and privacy aspect s of low-cost radio frequency identification authentication for RFID tags//Proceedings of the 18th IEEE systems//Proceedings of the 1st International Conference on International Conference on Network Protocols (ICNP'10). Security in Pervasive Computing (SPC'03),Boppard, Kyoto,J8pan,2010:154-163 Germany,2003:201-212 [24]Zheng Y,Li M.Fast tag searching protocol for large-scale [38]Ohkubo M,Suzuki K,Kinoshita S.Hash chain based for- RFID systems//Proceedings of the 19th IEEE International ward secure privacy protection scheme for low cost RFID// Conference on Network Protocols (ICNP'11).Vancouver, Proceedings of the Symposium on Cryptography and Informa Canada,2011:363-372 tion Security (SCIS'04).Sendai,Japan,2004:719-724 [39] [25]Sarma S E,Weis S A,Engels D W.RFID systems and secu- Zhou Yong-Bin,Feng Deng-Guo.Design and analysis of cryptographic protocols for RFID.Chinese Journal of rity and privacy implications//Proceedings of the 4th Interna- Computers,2006,29(4):581-589(in Chinese) tional Workshop on Cryptographic Hardware and Embedded (周永彬,冯登国.RFID安全协议的设计与分析.计算机学 Systems CHES'02).Redwood Shores,USA,2002 报,2006,29(4):581-589) 454-469 [40]Zhang Fan,Sun Xuan,Ma Jian-Feng,Cao Chun-Jie,Zhu [26]Inoue S,Yasuura H.RFID privacy using user-controllable Jian-Ming.A universally composable secure RFID communi- uniqueness//Proceedings of the RFID Privacy Workshop. cation protocol in supply chains.Chinese Joural of Computers, MIT,USA,2003 2008,31(10):1754-1767(in Chinese) [27]Lim T,Li T,Yeo S.A cross-layer framework for privacy (张帆,孙璇,马建峰,曹春杰,朱建明.供应链环境下通用 enhancement in RFID systems.Pervasive and Mobile Com- 可组合安全的RFID通信协议.计算机学报,2008,31(10): puting,2008,4(6):889-905 1754-1767) [28 Juels A,Rivest R L,Szydlo M.The blocker tag:Selective [41]Rieback M,Crispo B.Tanenbaum A.RFID guardian:A blocking of RFID tags for consumer privacy//Proceedings of battery-powered mobile device for RFID privacy manage- the 10th ACM Conference on Computer and Communications ment//Proceedings of the Australasian Conference on Infor- Security (CCS'03).Washington,USA,2003:103-111 mation Security and Privacy ACISP'05.Brisbane,Australia [29]Juels A.RFID security and privacy:A research survey. 2005:184-194 IEEE Journal on Selected Areas in Communications,2006, [42]Mirowski L,Hartnett J.Deckard:A system to detect 24(2):381-394 change of RFID tag ownership.International Journal of Com- [30]Song D X,Wagner D,Perrig A.Practical techniques for puter Science and Network Security,2007,7(7):89-98 searches on encrypted data//Proceedings of the IEEE Sympo- [43]Thamilarasu G,Sridhar R.Intrusion detection in RFID sium on Security and Privacy (S&P'00).Berkeley,USA, systems//Proceedings of the IEEE International Conference 2000:44-55 Military MILCOM.San Diego,USA,2008:1-7 [31]Wang S,Ding X,Deng R H,Bao F.Private information [44]Kawakita Y,Mitsugi J.Anti-collision performance of Gen2 retrieval using trusted hardware//Proceedings of the 11th air protocol in random error communication link//Proceedings European Symposium on Research in Computer Security of the International Symposium on Applications and the (ESORICS'06).Hamburg,Germany,2006:49-64 Internet Workshops.Phoenix,USA,2006:68-71 [32]Yang Z,Zhong S,Wright R N.Privacy-preserving queries on [45]Buettner M,Wetherall D.An empirical study of UHF RFID encrypted data//Proceedings of the 11th European Symposium performance//Proceedings of the 14th Annual International3期 谢 磊 等 :RFID 数 据 管 理 :算 法 、协 议 与 性 能 评 测 469 [19] [2O] [21] [22] [23] [24] [25] [26] [27] [28] [29] [3o] [31] [32] Symposium on M obile Ad Hoe Networking and Computing (MobiHoc’08).HongKong,China,2008:159—168 Kodialam M ,NandagopalT, Lau W . Anonymous tracking usingRFID tags//Pr0ceedingsofthe26thAnnualJointCon— ferenceoftheIEEE Com puterand CommunicationsSocieties (INFOCOM ’07).Anchorage,USA,2007:1217-1225 LiT,Chen S,Ling Y.Identifyingthemissingtagsin alarge RFID system//Proceedings ofthe 1lth ACM Interational Symposium on M obile Ad H oc Networking and Computing (MobiHoc’lO).Chicago,USA,2010:1—10 Qiao Y, Chen S,LiT,Chen S. Energy-efficientpolling protocolsin RFID systems//Proceedingsofthe 12th ACM InterationalSym posium on M obile Ad H oc Networking and Computing(MobiHoe’11).Paris,France,2011:25 ChenS,Zhang M , Xiao B. Efficientinform ation collection protocolsforsensor—augmentedRFID networks//Proceedings ofthe30th AnnualJointConferenceoftheIEEE Computer and Com munications Societies (INF0C0M ’11). Shanghai, China,2011:31O卜 31O9 Yang L, Han J, QiY,Liu Y. Identification-free batch authenticationforRFID tags//Proceedingsofthe18thIEEE Internati0nalConferenceon Network Protocols(ICNP’10). Kyoto,Japan,2010:154—163 Zheng Y ,LiM . Fasttag searching protocolfor large—scale RFID systems//Proeeedingsofthe19th IEEE International Conferenceon Network Protocols(ICNP ’11). Vancouver, Canada,2011:363-372 SarmaS E,W eisS A .EngelsD W .RFID systemsand secu— rityandprivacyimplications//Proceedingsofthe4thInterna— tiona1W orkshop on Crypt0graphicH ardwareand Embedded System s (CHES ’ O2). Redwood Shores, U SA , 2002: 454—469 Inoue S, Yasuura H. RFID privacy using user—controUable uniqueness//Proceedings ofthe RFID Privacy W orkshop. M IT,USA ,2003 Lira T, LiT ,Yeo S. A cross—layerfram ework for privacy enhancementin RFID systems. Pervasive and M obileCom— puting,2008,4(6):889—905 JuelsA,RivestR L,SzydloM.Theblockertag:Selective blockingofRFID tagsforconsumerprivacy//Proceedingsof the10th ACM Conferenceon Computerand Communications Security(CCS’03).Washington,USA,2003:103—111 JuelsA. RFID security and privacy: A research survey. IEEEJournalon Selected AreasinCommunications,2006, 24(2):381—394 Song D X , W agner D, Perrig A. Practical techniques for searchesonencrypteddata//ProceedingsoftheIEEESympo— sium onSecurity and Privacy(S&P’OO).Berkeley,USA, 2000 :44—55 W angS,Ding X, Deng R H , Bao F. Private information retrievalusing trusted hardware//Proceedingsof the 1lth European Symposium on Research in Computer Security (ES0RICS’06).Hamburg,Germany,2006:49—64 YangZ,Zhong S,W rightR N.Privacy-preserving querieson encrypteddata//Proceedingsofthe11thEuropeanSymposium [33] [343 [353 [363 [37] [38] [39] [4O] [41] [42] [433 [44] [453 onResearch inComputerSecurity(ESORICS’06). Ham burg, Germany,2006:479—495 TanC C, LiQ,Xie L. Privacy protection forRFID—based tracking systems//Proceedings of the IEEE International Conferenceon RFID. Orlando,USA ,2010:53—60 Posehmann A,LeanderG ,Sehramm K, PaarC. New light weightcryptoalgorithmsforRFID//Pr0ceedingsoftheIEEE Intern ationalSymposium on CircuitsandSystems(ISCAS’07). New Orleans,U SA ,2007:1843—1846 HongD,SungJ,HongS,Lim J,LeeS,KooB,LeeC, Chang D, Lee J, Jeong K, Kim H , Kim H, Chee S. H IGH T: A new block cipher suitable for 1ow-resource device//Proceedings ofthe 8th InternationalW orkshop on Cryptographic HardwareandEmbeddedSystems(CHES’06). Yokohama,Japan,2006:46—59 Sarma SE.W eisSA 。EngelsD W .Radiofrequencyidentifi— cation:Securerisksandchallenges.RSA LaboratoriesCryp— tobytes,2003,6(1):2—9 W eisS A ,Sarma S E,RivestR L,Engels D W . Security andprivacy aspectsoflow—costradiofrequency identification systems//Proceedingsofthe1stInternationalConferenceon Security in Pervasive Computing (SPC’03). Boppard, Germany,2003:201—212 OhkuboM ,SuzukiK ,Kinoshita S. H ash chain based for— wardsecureprivacyprotectionschemeforlow costRFID// ProceedingsoftheSym posium onCryptographyandInforma— tionSecurity(SCIS’04).Sendai,Japan,2004:719-724 Zhou Yong—Bin, Feng Deng—Guo. Design and analysis of cryptographic protocols for RFID. Chinese Journal of Computers,2006,29(4):581—589(inChinese) (周永彬 ,冯登 国.RFID安全协议 的设 计与分析.计算机学 报 ,2006,29(4):581—589) ZhangFan,Sun Xuan,MaJian-Feng,CaoChun—Jie,Zhu Jian—Ming.A universallycomposablesecureRFID communi— cationprotocolinsupplychains.ChineseJournalofComputers, 2008,31(1O):1754—1767(in Chinese) (张帆 ,孙璇 ,马建峰 ,曹春杰 ,朱建明.供 应链环境下通用 可组 合安全 的 RFID通信协议.计算机学报 ,2008,31(1o): 1754—1767) Rieback M , Crispo B, Tanenbaum A. RFID guardian: A battery—。powered mobile device for RFID privacy m anage—- ment//ProceedingsoftheAustralasian Conferenceon Infor— m ation SecurityandPrivacyACISP’05.Brisbane,Australia, 2005:184—194 MirowskiL, HartnettJ. Deckard: A system to detect changeofRFIDtagownership.InternationalJournalofCorn— puterScienceand Network Security,2007,7(7):89—98 Thamilarasu G , Sridhar R. Intrusion detection in RFID systems//ProceedingsoftheIEEE InternationalConference M ilitaryM ILCOM . SanDiego,USA ,2008:1-7 KawakitaY,MitsugiJ.Anti—collisionperformanceofGen2 airprotocolin random errorcommunication1ink//Pr0ceedings of the International Symposium on Applications and the InternetW orkshops.Phoenix,USA ,2006:68—71 BuettnerM ,W etherallD. AnempiricalstudyofU HF RFID performance//Proceedingsofthe14th AnnualInternational
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有