Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers /
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and select...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
Σειρά: | Lecture Notes in Computer Science,
7739 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- On the Security of Tan et al. Serverless RFID Authentication and Search Protocols
- Yet Another Ultralightweight Authentication Protocol That Is Broken.- Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols
- Yet Another Ultralightweight Authentication Protocol That Is Broken.- Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.