请选择 进入手机版 | 继续访问电脑版

科研迷论坛

 找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
查看: 50|回复: 0

Radio Frequency Identification Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers-[1]-[2010]-[pdf]-[Ari Juels (auth.), Siddika Berna Ors Yalcin (eds.)]

[复制链接]

该用户从未签到

0

主题

0

小红花

122

学币

管理员

Rank: 9

积分
0
发表于 2020-2-10 22:14:04 | 显示全部楼层 |阅读模式
★★★如何下载★★★1、VIP学者回复帖子后可以看到下载链接,免费下载!点击这里成为VIP学者!
2、普通用户回复帖子后可以看到下载链接,回复将花费5学币点击这里获取学币!


免费下载30页预览文件

书籍信息:
书名: Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
语言: English
格式: pdf
大小: 3.6M
页数: 271
年份: 2010
作者: Ari Juels (auth.), Siddika Berna Ors Yalcin (eds.)
版次: 1
系列: Lecture Notes in Computer Science 6370 : Security and Cryptology
出版社: Springer-Verlag Berlin Heidelberg

简介

This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010, held in Istanbul, Turkey, in June 2010. The 17 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 47 submissions. The papers focus on approaches to solve security and data-protection issues in advanced contactless technologies like RFID. Topics addressed are new applications for secure RFID systems, data protection and privacy-enhancing techniques for RFID, cryptographic protocols for RFID, integration of secure RFID systems, resource-efficient implementation of cryptography, attacks on RFID systems, and RFID security hardware.


目录
Front Matter....Pages -
The Physical Basis of RFID Security....Pages 1-1
Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model....Pages 2-21
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol....Pages 22-34
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones....Pages 35-49
Strong Authentication and Strong Integrity (SASI) Is Not That Strong....Pages 50-64
Privacy Models for RFID Schemes....Pages 65-65
On the Claimed Privacy of EC-RAC III....Pages 66-74
EC-RAC: Enriching a Capacious RFID Attack Collection....Pages 75-90
Anonymous RFID Authentication Using Trusted Computing Technologies....Pages 91-102
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly....Pages 103-122
Hardware Intrinsic Security....Pages 123-123
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting....Pages 124-137
Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols....Pages 138-157
Anonymous Authentication for RFID Systems....Pages 158-175
Leakage-Resilient RFID Authentication with Forward-Privacy....Pages 176-188
An ECDSA Processor for RFID Authentication....Pages 189-202
Towards a Practical Solution to the RFID Desynchronization Problem....Pages 203-219
Optimal Security Limits of RFID Distance Bounding Protocols....Pages 220-238
The Poulidor Distance-Bounding Protocol....Pages 239-257
A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications....Pages 258-269
Back Matter....Pages -

电子书下载地址(Ebook download address)回复可见:
游客,如果您要查看本帖隐藏内容请回复

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

Archiver|手机版|小黑屋|科研迷论坛 ( 闽ICP备17033831号-3 ) hello xym!!

GMT+8, 2020-4-11 01:56 , Processed in 0.024367 second(s), 10 queries , Redis On.

Powered by Discuz! X3.4

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表