|
|
|
|
LEADER |
03785nam a22005415i 4500 |
001 |
978-0-387-76481-8 |
003 |
DE-He213 |
005 |
20151125192419.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387764818
|9 978-0-387-76481-8
|
024 |
7 |
|
|a 10.1007/978-0-387-76481-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK7888.4
|
072 |
|
7 |
|a TJFC
|2 bicssc
|
072 |
|
7 |
|a TEC008010
|2 bisacsh
|
082 |
0 |
4 |
|a 621.3815
|2 23
|
245 |
1 |
0 |
|a RFID Security
|h [electronic resource] :
|b Techniques, Protocols and System-on-Chip Design /
|c edited by Paris Kitsos, Yan Zhang.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2008.
|
300 |
|
|
|a XII, 446 p. 176 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Fundamentals -- RFID: Fundamentals and Applications -- RFID: An Anticounterfeiting Tool -- RFID Security and Privacy -- Security Protocols and Techniques -- Design Trade-Offs for Realistic Privacy -- RFID Security: Cryptography and Physics Perspectives -- RFID Anticounterfeiting: An Architectural Perspective -- An Efficient and Secure RFID Security Method with Ownership Transfer -- Digital Signature Transponder -- Scalability Issues in Privacy-Compliant RFID Protocols -- Dynamic Privacy Protection for Mobile RFID Service -- Using RFID-based “Touch” for Intuitive User Interaction with Smart Space Security -- RFID Readers Deployment for Scalable Identification of Private Tags -- Encryption and Hardware Implementations -- Public-Key Cryptography for RFID Tags and Applications -- New Designs in Lightweight Symmetric Encryption -- Hardware Implementation of Symmetric Algorithms for RFID Security -- Hardware Implementation of a TEA-Based Lightweight Encryption for RFID Security.
|
520 |
|
|
|a RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamentals, security protocols and techniques, and hardware implementations of cryptographic algorithms dedicated to RFID. Features of the book consist of basic concepts, key technologies, and cutting-edge research outcomes of RFID security comprehensive references on state-of-the-art technologies for RFID security illustrative figures for easy reading and understanding of the materials implementations for algorithms in RFID security selected techniques for enhancing RFID security and performance. The book is written for those interested in wireless networks and mobile communications, especially researchers and engineers interested in communications as it relates to RFID Security.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronics.
|
650 |
|
0 |
|a Microelectronics.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Electronic circuits.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Circuits and Systems.
|
650 |
2 |
4 |
|a Signal, Image and Speech Processing.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Electronics and Microelectronics, Instrumentation.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Kitsos, Paris.
|e editor.
|
700 |
1 |
|
|a Zhang, Yan.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387764801
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-76481-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|