E-Book, Englisch, Band 7739, 181 Seiten, eBook
Hoepman / Verbauwhede Radio Frequency Identification: Security and Privacy Issues
Erscheinungsjahr 2013
ISBN: 978-3-642-36140-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
E-Book, Englisch, Band 7739, 181 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-642-36140-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.- Yet Another Ultralightweight Authentication Protocol That Is Broken.- Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols.- Yet Another Ultralightweight Authentication Protocol That Is Broken.- Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.