Image from Google Jackets

Radio Frequency Identification. Security and Privacy Issues [electronic resource] : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers / edited by Jaap-Henk Hoepman, Ingrid Verbauwhede.

Contributor(s): Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science ; 7739Publication details: Berlin, Heidelberg : Springer Berlin Heidelberg, 2013.Description: 1 online resource (X, 181 p. 37 ill.)ISBN:
  • 9783642361401
Subject(s): Online resources:
Contents:
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Materials specified Status Date due Barcode Item holds
Books Books National Library of India Available EBK000024730ENG
Total holds: 0

On the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.

There are no comments on this title.

to post a comment.
                                                                           
web counter

Copyright ©2020 The National Library of India, Govt. of India ↔ Hosted by NVLI, MOC ↔ Technology and Design by National Library of India, Ministry of Culture, Govt. of India