期刊文献+

射频识别技术的安全问题及防范策略 被引量:2

原文传递
导出
摘要 射频识别技术是利用无线射频方式进行非接触双向通信,自动识别目标对象并获取相关数据的高新技术,广泛应用于门禁系统、车辆防盗、物流管理等安全防范领域中。文章在简要介绍射频识别系统的工作原理和应用的基础上,针对射频识别系统面临的安全问题,提出相应的防范策略,以促进射频识别技术的健康发展。
作者 冯清枝 任媛
出处 《广东公安科技》 2008年第4期55-58,共4页
  • 相关文献

参考文献2

二级参考文献34

  • 1李毅,李红波.基于RFID技术的车辆综合自动管理系统的设计研究[J].微计算机信息,2005,21(10Z):153-154. 被引量:20
  • 2Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 3Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 4Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 5Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 6Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 7Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 8Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 9Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 10Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121

共引文献229

同被引文献13

  • 1杨海东,杨春.RFID安全问题研究[J].微计算机信息,2008,24(8):238-240. 被引量:34
  • 2Dennis E.Brown.RFID implementation/McGraw-Hill communicatlons[C].New York:McGraw-Hill,c2007.
  • 3Claus Heinrich.RFID and Beyond dianapolis[R].Indianapolis,IN:Wiley,c2005.
  • 4C.M.Roberts.Radio frequency identification(RFID)[J].ELSEVIR CoMputers & Security,2006,25:18-26.
  • 5郎为民 刘德敏 李建军.RFID安全机制研究.解放军通信指挥学院/沈阳军区网管中心,2007,9(3).
  • 6龙雨 李芳.RFID安全方案研.电脑知识与技术,2008,4(7).
  • 7王鑫,李春茂,唐婷.RFID安全与隐私威胁[J].实验技术与管理,2007,24(8):26-29. 被引量:3
  • 8Sarma S E,Weis S A, EngelsD W.Radio-Frequency Identification: Secure Risks and Challenges. RSA Laboratories Cryptobytes, 2003,6(1 ): 2-9.
  • 9SeisA, Sarma S E, Rivest R L Security and Privacy Aspects of Lowcost Radio Frequency Identification Systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing. Berlin,2004:201-212.
  • 10Suzukik OM, Kinoshita S. Hash Chain Based Forward Secure Privacy Protection Scheme for Low Cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Senda,i 2004:719-724.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部