• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2012³â Ãß°èÇмú´ëȸ

2012³â Ãß°èÇмú´ëȸ

Current Result Document : 28 / 171 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) À̵¿Çü ¸®´õ¸¦ »ç¿ëÇÏ´Â RFID½Ã½ºÅÛÀÇ º¸¾È ÇÁ·ÎÅäÄÝ ¼³°è
¿µ¹®Á¦¸ñ(English Title) Design of Security Protocol for RFID System using Mobile Reader
ÀúÀÚ(Author) ÀåºÀÀÓ   ±èâ¼ö   Á¤È¸°æ   Bong-Im Jang   Chang-Su Kim   Hoe-Kyung Jung  
¿ø¹®¼ö·Ïó(Citation) VOL 16 NO. 02 PP. 0954 ~ 0955 (2012. 10)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù ¸ð¹ÙÀÏ Åë½ÅÀåÄ¡ÀÇ »ç¿ëÀÌ Áõ°¡ÇÔ¿¡ µû¶ó »ç¹°¿¡ ºÎÂøµÈ ű׸¦ ÀνÄÇϱâ À§ÇÑ À̵¿Çü ¸®´õ±âÀÇ »ç¿ëµµ Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ¿¡ µû¶ó ±×µ¿¾È RFID ½Ã½ºÅÛÀÇ Ãë¾àÁ¡À¸·Î ´ëµÎµÇ¾ú´ø ¸®´õ¿Í ÅÂ±× »çÀÌÀÇ º¸¾È ¹®Á¦Á¡ »Ó¸¸ ¾Æ´Ï¶ó ¸®´õ¿Í ¹é¿£µå ¼­¹ö »çÀÌÀÇ º¸¾È ¹®Á¦°¡ ¹ß»ýÇÑ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â À̵¿Çü ¸®´õ¿Í ¹é¿£µå ¼­¹ö »çÀÌÀÇ º¸¾È Ãë¾àÁ¡À» ÇØ°áÇϱâ À§ÇØ Çؽ¬ÇÔ¼ö¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ÀÎÁõ ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.
Å°¿öµå(Keyword) RFID   Mobile Reader   Hash Function   Authentication Protocol  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå