This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.
Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts.- High-Speed Dating - Privacy-Preserving Attribute Matching for RFID.- Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags.- PIONEER - A Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag.- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks.- Cryptanalysis of SIMON Variants with Connections.- Privacy-Preserving Authorized RFID Authentication Protocols.- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node.- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers.- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID Tags.- ePassport: Side Channel in the Basic Access Control.- A Low Area Probing Detector for Power Efficient Security ICs.- Non-Linear Collision Analysis.
Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts.- High-Speed Dating - Privacy-Preserving Attribute Matching for RFID.- Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags.- PIONEER - A Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag.- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks.- Cryptanalysis of SIMON Variants with Connections.- Privacy-Preserving Authorized RFID Authentication Protocols.- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node.- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers.- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID Tags.- ePassport: Side Channel in the Basic Access Control.- A Low Area Probing Detector for Power Efficient Security ICs.- Non-Linear Collision Analysis.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826