|
|
|
|
LEADER |
02953nam a2200493 a 4500 |
001 |
30301 |
003 |
IGIG |
005 |
20130321123236.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
130319s2013 pau fob 000 0 eng d |
010 |
# |
# |
|z 2012045191
|
020 |
# |
# |
|a 9781466636866 (ebook)
|
020 |
# |
# |
|z 9781466636859 (hardcover)
|
020 |
# |
# |
|z 9781466636873 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-4666-3685-9
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00555054
|
035 |
# |
# |
|a (OCoLC)830740870
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a TK7872.D48
|b A296 2013e
|
082 |
0 |
4 |
|a 621.3841/92
|2 23
|
245 |
0 |
0 |
|a Advanced security and privacy for RFID technologies
|c Ali Miri, editor.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2013.
|
300 |
# |
# |
|a electronic texts (208 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a Security terminology / Ming Li -- RFID standards / Ilker Onat, Ali Miri -- RFID wireless link threats / Ilker Onat, Ali Miri -- Hardware attacks / Fanyu Kong, Ming Li -- Computer system attacks / Zhang Ning -- An overview of cryptography / Ehsan Vahedi, Vincent W.S. Wong, Ian F. Blake -- Identification and authentication for RFID systems / Behzad Malek -- Privacy issues in RFID / Boyeon Song -- DoS attacks on RFID systems: privacy vs. performance / Dang Nguyen Duc, Kwangjo Kim -- Malware protection on RFID-enabled supply chain management systems in the EPCglobal Network / Qiang Yan, Yingjiu Li, Robert H. Deng -- Addressing covert channel attacks in RFID-enabled supply chains / Kirti Chawla, Gabriel Robins -- Building scalable, private RFID systems / Li Lu.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book addresses security risks involved with RFID technologies, and gives insight on some possible solutions and preventions in dealing with these developing technologies"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed March 19, 2013).
|
650 |
# |
0 |
|a Sensor networks
|x Security measures.
|
650 |
# |
0 |
|a Radio frequency identification systems
|x Security measures.
|
653 |
# |
# |
|a IT policy and standardization
|
653 |
# |
# |
|a IT security and ethics
|
653 |
# |
# |
|a Mobile and wireless computing
|
653 |
# |
# |
|a Privacy requirements and solutions
|
653 |
# |
# |
|a RFID standardization and communication
|
653 |
# |
# |
|a Software and systems design
|
700 |
1 |
# |
|a Miri, Ali.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2012045191
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2012045191
|z 9781466636859
|z 1466636858
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-3685-9
|z View fulltext via EzAccess
|