Cantitate/Preț
Produs

Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers: Lecture Notes in Computer Science, cartea 6370

Editat de Siddika Berna Ors Yalcin
en Limba Engleză Paperback – 4 noi 2010

Din seria Lecture Notes in Computer Science

Preț: 33322 lei

Preț vechi: 41652 lei
-20% Nou

Puncte Express: 500

Preț estimativ în valută:
6377 6649$ 52100£

Carte disponibilă

Livrare economică 27 februarie-13 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642168215
ISBN-10: 3642168213
Pagini: 288
Ilustrații: X, 271 p. 72 illus.
Greutate: 0.44 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Professional/practitioner

Cuprins

Invited Talk 1.- The Physical Basis of RFID Security.- Session 1.- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model.- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones.- Strong Authentication and Strong Integrity (SASI) Is Not That Strong.- Invited Talk 2.- Privacy Models for RFID Schemes.- Session 2.- On the Claimed Privacy of EC-RAC III.- EC-RAC: Enriching a Capacious RFID Attack Collection.- Anonymous RFID Authentication Using Trusted Computing Technologies.- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly.- Invited Talk 3.- Hardware Intrinsic Security.- Session 3.- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting.- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols.- Anonymous Authentication for RFID Systems.- Leakage-Resilient RFID Authentication with Forward-Privacy.- Session 4.- An ECDSA Processor for RFID Authentication.- Towards a Practical Solution to the RFID Desynchronization Problem.- Session 5.- Optimal Security Limits of RFID Distance Bounding Protocols.- The Poulidor Distance-Bounding Protocol.- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications.

Caracteristici

High quality selected papers Unique visibility State of the art research