Anonymous RFID Authentication for Cloud Services
Abstract
Keywords
References
- P. Mell and T. Grance, “The nist definition of cloud computing,” 2011.
- I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud computing and grid computing 360-Degree compared,” ArXiv e-prints, vol. 901, Dec. 2009. [Online]. Available: http://arxiv.org/abs/0901.0131
- L. M. Kaufman, “Data security in the world of cloud comput- ing,” IEEE Security and Privacy, vol. 7, pp. 61–64, 2009.
- Z. Chai, Z. Cao, and R. Lu, “Efficient password-based authen- tication and key exchange scheme preserving user privacy,” in Wireless Algorithms, Systems, and Applications, ser. Lecture Notes in Computer Science, X. Cheng, W. Li, and T. Znati, Eds. 477.
- K. Finkenzeller, RFID Handbook: Fundamentals and Applica- tions in Contactless Smart Cards and Identification, 2nd ed. New York, NY, USA: John Wiley & Sons, Inc., 2003.
- L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, “Public-Key Cryptography for RFID-Tags,” in International Workshop on Pervasive Computing and Commu- nication Security – PerSec 2007, IEEE. York, USA: IEEE Computer Society, March 2007, pp. 217–222. New York City, New
- M. McLoone and M. J. B. Robshaw, “Public key cryptography and rfid tags,” in Topics in Cryptology - CT-RSA 2007, The Cryptographers’ Track at the RSA Conference 2007, ser. Lecture Notes in Computer Science, vol. 4377. USA: Springer, 2007, pp. 372–384. San Francisco, CA,
- Y. Yao, J. Huang, S. Khanna, A. Shelat, B. H. Calhoun, J. Lach, and D. Evans, “A Sub-0.5V Lattice-Based Public-Key Encryption Scheme for RFID Platforms in 130nm CMOS,” in Workshop on RFID Security – RFIDSec Asia’11, ser. Cryptol- ogy and Information Security, vol. 6. Wuxi, China: IOS Press, April 2011, pp. 96–113. [9]G. Avoine, “Rfid security & privacy lounge,” http://www.avoine.net/rfid, 2012.
Details
Primary Language
English
Subjects
-
Journal Section
-
Authors
Mehmet Kiraz
This is me
Muhammed Bingöl
This is me
Süleyman Kardaş
This is me
Fatih Birinci
This is me
Publication Date
July 2, 2012
Submission Date
January 30, 2016
Acceptance Date
-
Published in Issue
Year 2012 Volume: 1 Number: 2