Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers /
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and select...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
Series: | Lecture Notes in Computer Science,
7739 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-36140-1 |
Table of Contents:
- On the Security of Tan et al. Serverless RFID Authentication and Search Protocols
- Yet Another Ultralightweight Authentication Protocol That Is Broken.-��Improved Anonymity for Key-Trees-�Hidden Bits Approach for Authentication in RFID Systems.-�Designated Attribute-Based Proofs for RFID Applications.-�T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.-�Private Yoking Proofs: Attacks, Models and New Provable Constructions.-�Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.-�Weakening Passports through Bad Implementations.-�Never Trust a Bunny.-�On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.-�DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols
- Yet Another Ultralightweight Authentication Protocol That Is Broken.-��Improved Anonymity for Key-Trees-�Hidden Bits Approach for Authentication in RFID Systems.-�Designated Attribute-Based Proofs for RFID Applications.-�T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.-�Private Yoking Proofs: Attacks, Models and New Provable Constructions.-�Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.-�Weakening Passports through Bad Implementations.-�Never Trust a Bunny.-�On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.-�DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.