IPAP: Improved privacy and authentication protocol for passive RFID tags
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Sung-Ho | - |
dc.contributor.author | Lee, Hong-Jin | - |
dc.contributor.author | Jung, Han-Wool | - |
dc.contributor.author | Maeng, Beom-Ki | - |
dc.contributor.author | Park, Yongsu | - |
dc.date.accessioned | 2022-12-20T10:44:42Z | - |
dc.date.available | 2022-12-20T10:44:42Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2010-12 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/173306 | - |
dc.description.abstract | One of the problems in low-cost passive RFID tags is that they do not provide authentication and privacy. To address this problem Liu et al. proposed the PAP protocol for low-cost passive RFID tag in ICCST 2009. The PAP is has low computation and ensures privacy and authentication between tags and readers, especially designed for SCM (Supply Chain Management) and small shops. We present an IPAP: Improved Privacy and Authentication Protocol. IPAP has 2-bits privacy bit to support refined privacy protection and lower computation overhead compared with the original PAP. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.title | IPAP: Improved privacy and authentication protocol for passive RFID tags | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Yongsu | - |
dc.identifier.doi | 10.1109/ICNIDC.2010.5657894 | - |
dc.identifier.scopusid | 2-s2.0-78651283189 | - |
dc.identifier.bibliographicCitation | Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010, pp.30 - 34 | - |
dc.relation.isPartOf | Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010 | - |
dc.citation.title | Proceedings - 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010 | - |
dc.citation.startPage | 30 | - |
dc.citation.endPage | 34 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Authentication protocols | - |
dc.subject.keywordPlus | Computation overheads | - |
dc.subject.keywordPlus | Passive RFID | - |
dc.subject.keywordPlus | Privacy protection | - |
dc.subject.keywordPlus | RFID privacy | - |
dc.subject.keywordPlus | RFID security | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | Supply chain management | - |
dc.subject.keywordPlus | Supply chains | - |
dc.subject.keywordPlus | Radio navigation | - |
dc.subject.keywordAuthor | Passive RFID tag security | - |
dc.subject.keywordAuthor | RFID privacy | - |
dc.subject.keywordAuthor | RFID security | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/5657894 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.