Cargando…

Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting /

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the extent of their success, the various barriers that may be brought against their actions, and the effectiveness of those barriers. The new field of lightweight cryptograp...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Cole, Peter H. (Editor ), Ranasinghe, Damith C. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-71641-9
003 DE-He213
005 20220118052354.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540716419  |9 978-3-540-71641-9 
024 7 |a 10.1007/978-3-540-71641-9  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Networked RFID Systems and Lightweight Cryptography  |h [electronic resource] :  |b Raising Barriers to Product Counterfeiting /  |c edited by Peter H. Cole, Damith C. Ranasinghe. 
250 |a 1st ed. 2008. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2008. 
300 |a VIII, 355 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a from the editors -- from the editors -- Anti-counterfeiting and RFID -- Anti-Counterfeiting and Supply Chain Security -- Networked RFID Systems -- EPC Network Architecture -- A Security Primer -- Security and Privacy Current Status -- Addressing Insecurities and Violations of Privacy -- RFID Tag Vulnerabilities in RFID Systems -- An Evaluation Framework -- From Identification to Authentication - A Review of RFID Product Authentication Techniques -- Network Based Solutions -- EPC System for a Safe & Secure Supply Chain and How it is Applied -- The Potential of RFID and NFC in Anti-Counterfeiting -- Improving the Safety and Security of the Pharmaceutical Supply Chain -- Cryptographic Solutions -- Product Specific Security Based on RFID Technology -- Strengthening the Security of Machine-Readable Documents -- Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning -- A Random Number Generator for Application in RFID Tags -- A Low Cost Solution to Cloning and Authentication Based on a Lightweight Primitive -- Lightweight Cryptography for Low Cost RFID. 
520 |a This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the extent of their success, the various barriers that may be brought against their actions, and the effectiveness of those barriers. The new field of lightweight cryptography is described in the context of using RFID systems in the fight against counterfeit products, its cost effectiveness is examined and feasible approaches to its deployment are described. Research problems and likely avenues for solutions are also presented to guide a global effort in anti-counterfeiting. 
650 0 |a Computer networks . 
650 0 |a Industrial Management. 
650 0 |a Application software. 
650 0 |a Production management. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Industrial Management. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a Operations Management. 
700 1 |a Cole, Peter H.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Ranasinghe, Damith C.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540836902 
776 0 8 |i Printed edition:  |z 9783642090790 
776 0 8 |i Printed edition:  |z 9783540716402 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-540-71641-9  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)