|
|
|
|
LEADER |
03861nam a22005295i 4500 |
001 |
4536 |
003 |
DE-He213 |
005 |
20130725194554.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 xxu| s |||| 0|eng d |
020 |
# |
# |
|a 9780387764818
|9 978-0-387-76481-8
|
024 |
7 |
# |
|a 10.1007/978-0-387-76481-8
|2 doi
|
050 |
# |
4 |
|a TK7888.4
|
072 |
# |
7 |
|a TJFC
|2 bicssc
|
072 |
# |
7 |
|a TEC008010
|2 bisacsh
|
082 |
0 |
4 |
|a 621.3815
|2 23
|
100 |
1 |
# |
|a Kitsos, Paris.
|e editor.
|
245 |
1 |
0 |
|a RFID Security
|b Techniques, Protocols and System-on-Chip Design /
|c edited by Paris Kitsos, Yan Zhang.
|h [electronic resource] :
|
264 |
# |
1 |
|a Boston, MA :
|b Springer US,
|c 2009.
|
300 |
# |
# |
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
505 |
0 |
# |
|a Introduction -- Part I -- RFID Security and privacy -- RFID chips -- Part II -- Techniques and Protocols -- RFID anti-counterfeiting -- Man-in-the-middle attacks on RFID systems -- Digital Signature Transponder -- Combining Physics and Cryptography to Enhance Privacy in RFID Systems -- Scalability Issues in Large-Scale Applications -- An Efficient and Secure RFID Security Method with Ownership Transfe -- Policy-based Dynamic Privacy Protection Framework leveraging Globally Mobile RFIDs -- User-Centric Security for RFID-based Distributed Systems -- Optimizing RFID protocols for Low Information Leakage -- RFID: an anti-counterfeiting tool -- Part III -- Hardware implementation and Cryptography -- Light Weight Cryptography for RFID -- Hardware implementation of symmetric algorithms for RFID security -- Hardware-based Privacy Enhancing Technology for RFID -- Public-key Cryptography for RFID tags -- Unclonable RFID Tags and Their Hardware Implementation -- Low-cost Cryptographic Algorithms for RFID -- Implementation of Low Power Hardware Encryption Core for Low Cost Secure RFID Using Tiny Encryption Algorithm (TEA).
|
520 |
# |
# |
|a RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamentals, security protocols and techniques, and hardware implementations of cryptographic algorithms dedicated to RFID. Features of the book consist of basic concepts, key technologies, and cutting-edge research outcomes of RFID security comprehensive references on state-of-the-art technologies for RFID security illustrative figures for easy reading and understanding of the materials implementations for algorithms in RFID security selected techniques for enhancing RFID security and performance. The book is written for those interested in wireless networks and mobile communications, especially researchers and engineers interested in communications as it relates to RFID Security.
|
650 |
# |
0 |
|a Engineering.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Electronics.
|
650 |
# |
0 |
|a Telecommunication.
|
650 |
# |
0 |
|a Systems engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Circuits and Systems.
|
650 |
2 |
4 |
|a Signal, Image and Speech Processing.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Electronics and Microelectronics, Instrumentation.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
# |
|a Zhang, Yan.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387764801
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-76481-8
|
912 |
# |
# |
|a ZDB-2-ENG
|
950 |
# |
# |
|a Engineering (Springer-11647)
|