RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware…mehr
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chips. Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Artikelnr. des Verlages: 12071272, 978-0-387-76480-1
2008
Seitenzahl: 456
Erscheinungstermin: 19. September 2008
Englisch
Abmessung: 241mm x 160mm x 29mm
Gewicht: 770g
ISBN-13: 9780387764801
ISBN-10: 0387764801
Artikelnr.: 23154593
Inhaltsangabe
Fundamentals.- RFID: Fundamentals and Applications.- RFID: An Anticounterfeiting Tool.- RFID Security and Privacy.- Security Protocols and Techniques.- Design Trade-Offs for Realistic Privacy.- RFID Security: Cryptography and Physics Perspectives.- RFID Anticounterfeiting: An Architectural Perspective.- An Efficient and Secure RFID Security Method with Ownership Transfer.- Digital Signature Transponder.- Scalability Issues in Privacy-Compliant RFID Protocols.- Dynamic Privacy Protection for Mobile RFID Service.- Using RFID-based "Touch" for Intuitive User Interaction with Smart Space Security.- RFID Readers Deployment for Scalable Identification of Private Tags.- Encryption and Hardware Implementations.- Public-Key Cryptography for RFID Tags and Applications.- New Designs in Lightweight Symmetric Encryption.- Hardware Implementation of Symmetric Algorithms for RFID Security.- Hardware Implementation of a TEA-Based Lightweight Encryption for RFID Security.
Fundamentals.- RFID: Fundamentals and Applications.- RFID: An Anticounterfeiting Tool.- RFID Security and Privacy.- Security Protocols and Techniques.- Design Trade-Offs for Realistic Privacy.- RFID Security: Cryptography and Physics Perspectives.- RFID Anticounterfeiting: An Architectural Perspective.- An Efficient and Secure RFID Security Method with Ownership Transfer.- Digital Signature Transponder.- Scalability Issues in Privacy-Compliant RFID Protocols.- Dynamic Privacy Protection for Mobile RFID Service.- Using RFID-based “Touch” for Intuitive User Interaction with Smart Space Security.- RFID Readers Deployment for Scalable Identification of Private Tags.- Encryption and Hardware Implementations.- Public-Key Cryptography for RFID Tags and Applications.- New Designs in Lightweight Symmetric Encryption.- Hardware Implementation of Symmetric Algorithms for RFID Security.- Hardware Implementation of a TEA-Based Lightweight Encryption for RFID Security.
Fundamentals.- RFID: Fundamentals and Applications.- RFID: An Anticounterfeiting Tool.- RFID Security and Privacy.- Security Protocols and Techniques.- Design Trade-Offs for Realistic Privacy.- RFID Security: Cryptography and Physics Perspectives.- RFID Anticounterfeiting: An Architectural Perspective.- An Efficient and Secure RFID Security Method with Ownership Transfer.- Digital Signature Transponder.- Scalability Issues in Privacy-Compliant RFID Protocols.- Dynamic Privacy Protection for Mobile RFID Service.- Using RFID-based "Touch" for Intuitive User Interaction with Smart Space Security.- RFID Readers Deployment for Scalable Identification of Private Tags.- Encryption and Hardware Implementations.- Public-Key Cryptography for RFID Tags and Applications.- New Designs in Lightweight Symmetric Encryption.- Hardware Implementation of Symmetric Algorithms for RFID Security.- Hardware Implementation of a TEA-Based Lightweight Encryption for RFID Security.
Fundamentals.- RFID: Fundamentals and Applications.- RFID: An Anticounterfeiting Tool.- RFID Security and Privacy.- Security Protocols and Techniques.- Design Trade-Offs for Realistic Privacy.- RFID Security: Cryptography and Physics Perspectives.- RFID Anticounterfeiting: An Architectural Perspective.- An Efficient and Secure RFID Security Method with Ownership Transfer.- Digital Signature Transponder.- Scalability Issues in Privacy-Compliant RFID Protocols.- Dynamic Privacy Protection for Mobile RFID Service.- Using RFID-based “Touch” for Intuitive User Interaction with Smart Space Security.- RFID Readers Deployment for Scalable Identification of Private Tags.- Encryption and Hardware Implementations.- Public-Key Cryptography for RFID Tags and Applications.- New Designs in Lightweight Symmetric Encryption.- Hardware Implementation of Symmetric Algorithms for RFID Security.- Hardware Implementation of a TEA-Based Lightweight Encryption for RFID Security.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG i.I. Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309