Radio Frequency Identification (RFID) systems have become popular for identifying not only objects but also persons. For example, in supply chain applications, the company can constantly track the movements of goods. Also, for Body Area Network or Personal Area Work, the tag is usually used for identifying a person. However, the movements and current locations of goods and a person’s activity profiles are the sensitive information and should be kept secret. This paper develops the interaction protocols between readers and tags to address this privacy issue of protecting tagged objects from tracking and tracing by unauthorized readers.
목차
Abstract 1. Introduction 2. Formatting your paper 2.1. Previous Works 2.2. Motivation 3. The Propose Schemes 3.1. Scheme A 3.2. Scheme B 3.3. Scheme C 4. Security Analyses and Comparison 5. Conclusions 6. Acknowledgement 7. References 8. Appendix
저자
Ming-Yang Chen [ Department of Electrical Engineering, National Cheng-Kung University, Taiwan ]
Ching-Nung Yang [ Corresponding author Department of Computer Science and Information Engineering National Dong Hwa University ]
Chi-Sung Laih [ Department of Electrical Engineering, National Cheng-Kung University, Taiwan ]
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.1 No.1