RFID Security and Privacy Concepts, Protocols, and Architectures /

RFID technology is already used widely and is increasingly becoming a part of daily life. However, issues regarding security and privacy with respect to RFID technology have not been resolved satisfactorily. The challenges which must be overcome to resolve RFID security and privacy issues are immens...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Henrici, Dirk (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.
Σειρά:Lecture Notes Electrical Engineering ; 17
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03697nam a22005655i 4500
001 978-3-540-79076-1
003 DE-He213
005 20151121052625.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540790761  |9 978-3-540-79076-1 
024 7 |a 10.1007/978-3-540-79076-1  |2 doi 
040 |d GrThAP 
050 4 |a TK5102.9 
050 4 |a TA1637-1638 
050 4 |a TK7882.S65 
072 7 |a TTBM  |2 bicssc 
072 7 |a UYS  |2 bicssc 
072 7 |a TEC008000  |2 bisacsh 
072 7 |a COM073000  |2 bisacsh 
082 0 4 |a 621.382  |2 23 
100 1 |a Henrici, Dirk.  |e author. 
245 1 0 |a RFID Security and Privacy  |h [electronic resource] :  |b Concepts, Protocols, and Architectures /  |c by Dirk Henrici. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2008. 
300 |a XI, 269 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes Electrical Engineering ;  |v 17 
505 0 |a Motivation and Vision -- Fundamentals -- Analysis and Modeling -- Securing RFID Systems -- Pseudonymization Infrastructures -- Extending the RFID System Model -- Current Research. 
520 |a RFID technology is already used widely and is increasingly becoming a part of daily life. However, issues regarding security and privacy with respect to RFID technology have not been resolved satisfactorily. The challenges which must be overcome to resolve RFID security and privacy issues are immense; primarily because of the many constraints attached to the provision of security and privacy in RFID systems. These challenges are chiefly technical and economic in nature but also include ethical and social issues. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long lasting. The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and discusses the goals and attacker models. This is followed by an introduction to state-of-the-art of RFID security and privacy systems technology. The concepts which underlie the proposed protocols are highlighted, explained, and illustrated using examples. For building open, inter-organizational RFID systems, the classic RFID model is extended and considerations in new directions are explored. RFID systems are then integrated into other parts of the pervasive computing vision. Among the current research results presented in this book, a new comprehensive framework, including required protocols for operation, is introduced. It can be used economically on a global scope, supports inter-organizational cooperation and data sharing, and adheres to all the architectural guidelines derived in this work. 
650 0 |a Engineering. 
650 0 |a Computer communication systems. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers and civilization. 
650 0 |a Electrical engineering. 
650 1 4 |a Engineering. 
650 2 4 |a Signal, Image and Speech Processing. 
650 2 4 |a Data Encryption. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Computers and Society. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540790754 
830 0 |a Lecture Notes Electrical Engineering ;  |v 17 
856 4 0 |u http://dx.doi.org/10.1007/978-3-540-79076-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)