Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6370 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Talk 1
- The Physical Basis of RFID Security
- Session 1
- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model
- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
- Strong Authentication and Strong Integrity (SASI) Is Not That Strong
- Invited Talk 2
- Privacy Models for RFID Schemes
- Session 2
- On the Claimed Privacy of EC-RAC III
- EC-RAC: Enriching a Capacious RFID Attack Collection
- Anonymous RFID Authentication Using Trusted Computing Technologies
- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
- Invited Talk 3
- Hardware Intrinsic Security
- Session 3
- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting
- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols
- Anonymous Authentication for RFID Systems
- Leakage-Resilient RFID Authentication with Forward-Privacy
- Session 4
- An ECDSA Processor for RFID Authentication
- Towards a Practical Solution to the RFID Desynchronization Problem
- Session 5
- Optimal Security Limits of RFID Distance Bounding Protocols
- The Poulidor Distance-Bounding Protocol
- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications.