RFID Security Techniques, Protocols and System-on-Chip Design /

RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamentals,...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Kitsos, Paris. (Editor), Zhang, Yan. (Editor)
Format: Electronic
Language:English
Published: Boston, MA : Springer US, 2009.
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-76481-8
LEADER 03861nam a22005295i 4500
001 4536
003 DE-He213
005 20130725194554.0
007 cr nn 008mamaa
008 100301s2009 xxu| s |||| 0|eng d
020 # # |a 9780387764818  |9 978-0-387-76481-8 
024 7 # |a 10.1007/978-0-387-76481-8  |2 doi 
050 # 4 |a TK7888.4 
072 # 7 |a TJFC  |2 bicssc 
072 # 7 |a TEC008010  |2 bisacsh 
082 0 4 |a 621.3815  |2 23 
100 1 # |a Kitsos, Paris.  |e editor. 
245 1 0 |a RFID Security  |b Techniques, Protocols and System-on-Chip Design /  |c edited by Paris Kitsos, Yan Zhang.  |h [electronic resource] : 
264 # 1 |a Boston, MA :  |b Springer US,  |c 2009. 
300 # # |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
505 0 # |a Introduction -- Part I -- RFID Security and privacy -- RFID chips -- Part II -- Techniques and Protocols -- RFID anti-counterfeiting -- Man-in-the-middle attacks on RFID systems -- Digital Signature Transponder -- Combining Physics and Cryptography to Enhance Privacy in RFID Systems -- Scalability Issues in Large-Scale Applications -- An Efficient and Secure RFID Security Method with Ownership Transfe -- Policy-based Dynamic Privacy Protection Framework leveraging Globally Mobile RFIDs -- User-Centric Security for RFID-based Distributed Systems -- Optimizing RFID protocols for Low Information Leakage -- RFID: an anti-counterfeiting tool -- Part III -- Hardware implementation and Cryptography -- Light Weight Cryptography for RFID -- Hardware implementation of symmetric algorithms for RFID security -- Hardware-based Privacy Enhancing Technology for RFID -- Public-key Cryptography for RFID tags -- Unclonable RFID Tags and Their Hardware Implementation -- Low-cost Cryptographic Algorithms for RFID -- Implementation of Low Power Hardware Encryption Core for Low Cost Secure RFID Using Tiny Encryption Algorithm (TEA). 
520 # # |a RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamentals, security protocols and techniques, and hardware implementations of cryptographic algorithms dedicated to RFID. Features of the book consist of basic concepts, key technologies, and cutting-edge research outcomes of RFID security comprehensive references on state-of-the-art technologies for RFID security illustrative figures for easy reading and understanding of the materials implementations for algorithms in RFID security selected techniques for enhancing RFID security and performance. The book is written for those interested in wireless networks and mobile communications, especially researchers and engineers interested in communications as it relates to RFID Security. 
650 # 0 |a Engineering. 
650 # 0 |a Computer Communication Networks. 
650 # 0 |a Data encryption (Computer science). 
650 # 0 |a Electronics. 
650 # 0 |a Telecommunication. 
650 # 0 |a Systems engineering. 
650 1 4 |a Engineering. 
650 2 4 |a Circuits and Systems. 
650 2 4 |a Signal, Image and Speech Processing. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Electronics and Microelectronics, Instrumentation. 
650 2 4 |a Computer Communication Networks. 
700 1 # |a Zhang, Yan.  |e editor. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387764801 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-76481-8 
912 # # |a ZDB-2-ENG 
950 # # |a Engineering (Springer-11647)