40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
20 °P sammeln
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
20 °P sammeln
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
20 °P sammeln
Jetzt verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
20 °P sammeln
  • Format: PDF

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the extent of their success, the various barriers that may be brought against their actions, and the effectiveness of those barriers. The new field of lightweight cryptography is described in the context of using RFID systems in the fight against counterfeit products, its cost effectiveness is examined and feasible approaches to its deployment are described. Research problems and likely avenues for solutions are also presented to guide a global effort in anti-counterfeiting.…mehr

Produktbeschreibung
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the extent of their success, the various barriers that may be brought against their actions, and the effectiveness of those barriers. The new field of lightweight cryptography is described in the context of using RFID systems in the fight against counterfeit products, its cost effectiveness is examined and feasible approaches to its deployment are described. Research problems and likely avenues for solutions are also presented to guide a global effort in anti-counterfeiting.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Rezensionen
From the reviews:

"Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting is written to introduce readers to the new, complex and sometimes shadowy world of RFID cryptography. The book is divided into four sections, covering key aspects of the field. ... The articles ... present a generally comprehensive view of the issues and challenges facing RFID cryptographic technology developers and users. ... for any enterprise considering the adoption of counterfeit-fighting RFID technology, Networked RFID Systems and Lightweight Cryptography remains a valuable information resource." (Radio Frequency Identification Journal, August, 2008)