04086nam 22007335 450 991048316250332120200703232330.03-319-13066-810.1007/978-3-319-13066-8(CKB)3710000000306170(SSID)ssj0001386734(PQKBManifestationID)11766808(PQKBTitleCode)TC0001386734(PQKBWorkID)11374462(PQKB)10627323(DE-He213)978-3-319-13066-8(MiAaPQ)EBC6286165(MiAaPQ)EBC5595565(Au-PeEL)EBL5595565(OCoLC)1076258428(PPN)183094573(EXLCZ)99371000000030617020141114d2014 u| 0engurnn|008mamaatxtccrRadio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers /edited by Nitesh Saxena, Ahmad-Reza Sadeghi1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (VIII, 215 p. 62 illus.) Security and Cryptology ;8651Includes index.3-319-13065-X Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts -- High-Speed Dating - Privacy-Preserving Attribute Matching for RFID -- Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags -- PIONEER - A Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag -- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks -- Cryptanalysis of SIMON Variants with Connections -- Privacy-Preserving Authorized RFID Authentication Protocols -- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node -- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers -- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID Tags -- ePassport: Side Channel in the Basic Access Control -- A Low Area Probing Detector for Power Efficient Security ICs -- Non-Linear Collision Analysis.This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.Security and Cryptology ;8651Computer securityData encryption (Computer science)Computer communication systemsE-commerceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022e-Commerce/e-businesshttps://scigraph.springernature.com/ontologies/product-market-codes/I26000Computer security.Data encryption (Computer science).Computer communication systems.E-commerce.Systems and Data Security.Cryptology.Computer Communication Networks.e-Commerce/e-business.621Saxena Niteshedthttp://id.loc.gov/vocabulary/relators/edtSadeghi Ahmad-Rezaedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483162503321Radio Frequency Identification: Security and Privacy Issues2555846UNINA