Radio Frequency Identification: Security And Privacy Issues: 10th International Workshop, Rfidsec 2014, Oxford, Uk, July 21-23, 201 by Nitesh SaxenaRadio Frequency Identification: Security And Privacy Issues: 10th International Workshop, Rfidsec 2014, Oxford, Uk, July 21-23, 201 by Nitesh Saxena

Radio Frequency Identification: Security And Privacy Issues: 10th International Workshop, Rfidsec…

byNitesh SaxenaEditorAhmad-Reza Sadeghi

Paperback | November 28, 2014

Pricing and Purchase Info

$77.04 online 
$82.95 list price save 7%
Earn 385 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.
Title:Radio Frequency Identification: Security And Privacy Issues: 10th International Workshop, Rfidsec…Format:PaperbackDimensions:215 pagesPublished:November 28, 2014Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:331913065X

ISBN - 13:9783319130651

Look for similar items by category:

Reviews

Table of Contents

Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts.- High-Speed Dating - Privacy-Preserving Attribute Matching for RFID.- Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags.- PIONEER - A Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag.- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks.- Cryptanalysis of SIMON Variants with Connections.- Privacy-Preserving Authorized RFID Authentication Protocols.- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node.- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers.- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID Tags.- ePassport: Side Channel in the Basic Access Control.- A Low Area Probing Detector for Power Efficient Security ICs.- Non-Linear Collision Analysis.