LEADER 00866nam a2200253 i 4500 001 991000230429707536 005 20020509163943.0 008 001109s1980 it ||| | ita 035 $ab11328873-39ule_inst 035 $aPARLA204386$9ExL 040 $aDip.to Scienze Storiche Fil. e Geogr.$bita 082 0 $a823.9 100 1 $aRoth, Philip$0439176 245 13$aLo scrittore fantasma /$cPhilip Roth 260 $aMilano :$bBompiani,$c1980 300 $a185 p. ;$c20 cm. 500 $aTrad. di Pier Francesco Paolini. 740 4 $aThe ghost writer 907 $a.b11328873$b21-09-06$c01-07-02 912 $a991000230429707536 945 $aLE009 STOR.898-123$g1$i2009000020979$lle009$o-$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i11501704$z01-07-02 996 $aScrittore fantasma$9824351 997 $aUNISALENTO 998 $ale009$b01-01-00$cm$da $e-$fita$git $h3$i1 LEADER 05152nam 22008175 450 001 9910739463403321 005 20251226202447.0 010 $a3-642-36139-0 024 7 $a10.1007/978-3-642-36140-1 035 $a(CKB)3400000000125721 035 $a(SSID)ssj0000880060 035 $a(PQKBManifestationID)11546669 035 $a(PQKBTitleCode)TC0000880060 035 $a(PQKBWorkID)10894990 035 $a(PQKB)11538322 035 $a(DE-He213)978-3-642-36140-1 035 $a(MiAaPQ)EBC3093264 035 $a(PPN)168329824 035 $a(EXLCZ)993400000000125721 100 $a20130129d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRadio Frequency Identification: Security and Privacy Issues $e8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers /$fedited by Jaap-Henk Hoepman, Ingrid Verbauwhede 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 181 p. 37 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v7739 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-36140-4 327 $aOn the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. 330 $aThis book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v7739 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aInformation technology$xManagement 606 $aElectronic commerce 606 $aComputer networks 606 $aComputers, Special purpose 606 $aData and Information Security 606 $aCryptology 606 $aComputer Application in Administrative Data Processing 606 $ae-Commerce and e-Business 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aInformation technology$xManagement. 615 0$aElectronic commerce. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Application in Administrative Data Processing. 615 24$ae-Commerce and e-Business. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a621.384192 702 $aHoepman$b Jaap-Henk$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVerbauwhede$b Ingrid$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910739463403321 996 $aRadio Frequency Identification: Security and Privacy Issues$92555846 997 $aUNINA