- 요약
- ABSTRACT
- Ⅰ. 서론
- Ⅱ. 관련 연구
- Ⅲ. 제안하는 RFID 경계 결정 프로토콜

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A82413877
2010
Korean
567
KCI등재
학술저널
1350-1359(10쪽)
3
0
상세조회0
다운로드목차 (Table of Contents)
참고문헌 (Reference)
1 A. Juels, "Squealing euros:privacy protection in RFID-enabled banknotes" Springer-Verlag 2742 : 103-121, 2003
2 Samy Bengio, "Secure implementation of identification systems" 4 (4): 175-183, 1991
3 S.A.Weis, "Radio-frequency identification security and privacy" M.I.T. 2003
4 S. E. Sarma, "RFID systems,security & privacy implications"
5 Y.-J. Tu, "RFID distance bounding protocols"
6 Y. Desmedt, "Major security problems with the “Unforgeable” (Feige)-Fiat-Shamir proofs of identiy and how to overcome them"
7 I. Satoh, "Location-based services in ubiquitous computing environments"
8 ISO 18092 (ECMA-340), "Information technology—telecommunications and information exchange between systems—near field communication—interface and protocol (NFCIP-1)"
9 Thomas Beth, "Identification tokens - or: Solving the chess grandmaster p"
10 ISO 14443, "Identification cards—contactless integrated circuit cards—proximity cards"
1 A. Juels, "Squealing euros:privacy protection in RFID-enabled banknotes" Springer-Verlag 2742 : 103-121, 2003
2 Samy Bengio, "Secure implementation of identification systems" 4 (4): 175-183, 1991
3 S.A.Weis, "Radio-frequency identification security and privacy" M.I.T. 2003
4 S. E. Sarma, "RFID systems,security & privacy implications"
5 Y.-J. Tu, "RFID distance bounding protocols"
6 Y. Desmedt, "Major security problems with the “Unforgeable” (Feige)-Fiat-Shamir proofs of identiy and how to overcome them"
7 I. Satoh, "Location-based services in ubiquitous computing environments"
8 ISO 18092 (ECMA-340), "Information technology—telecommunications and information exchange between systems—near field communication—interface and protocol (NFCIP-1)"
9 Thomas Beth, "Identification tokens - or: Solving the chess grandmaster p"
10 ISO 14443, "Identification cards—contactless integrated circuit cards—proximity cards"
11 ISO 15693, "Identification cards–contactless integrated circuit cards—vicinity cards"
12 S. Brands, "Distance-bounding protocols"
13 C. Meadows, "Distance bounding protocols: authentication logic analysis and collusion attacks" Springer-Verlag 279-298, 2007
14 J. Munilla, "Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels"
15 D. Singelee, "Distance bounding in noisy environments Vol.4572" Springer 101-115, 2007
16 J. Reid, "Detecting relay attacks with timing-based protocols" 204-213, 2007
17 J. Munilla, "Attacks on a distance bounding protocol" 33 (33): 884-889, 2010
18 G. Hancke, "An RFID distance bounding protocol" 67-73, 2005
19 G.P. Hancke, "A practical relay attack on ISO 14443 proximity cards"
페이로드 시그니처 기반 트래픽 분석 시스템의 성능 향상
스마트 그리드를 위한 IEEE 802.11s 기반 무선 메쉬 네트워크
학술지 이력
| 연월일 | 이력구분 | 이력상세 | 등재구분 |
|---|---|---|---|
| 2015-01-01 | 평가 | 학술지 통합(등재유지) | |
| 2014-11-07 | 학술지명변경 | 한글명 : 한국통신학회논문지B</br>외국어명 : The Journal of Korean Institute of Communications and Information Sciences B | ![]() |
| 2014-08-08 | 학술지명변경 | 한글명 : 한국통신학회논문지B</br>외국어명 : The Journal of the Korean Institute of Communication Science B | ![]() |
| 2003-01-01 | 평가 | 등재학술지 선정(등재후보2차) | ![]() |
| 2001-01-01 | 평가 | 등재후보학술지 선정(신규평가) | ![]() |