LEADER 03080nam 2200613 a 450 001 9910825466903321 005 20230725023900.0 010 $a6612692723 010 $a1-282-69272-0 010 $a9786612692727 010 $a1-60750-485-5 035 $a(CKB)2670000000033303 035 $a(EBL)557057 035 $a(OCoLC)647184849 035 $a(SSID)ssj0000441433 035 $a(PQKBManifestationID)12130619 035 $a(PQKBTitleCode)TC0000441433 035 $a(PQKBWorkID)10406892 035 $a(PQKB)11622878 035 $a(MiAaPQ)EBC557057 035 $a(Au-PeEL)EBL557057 035 $a(CaPaEBR)ebr10403969 035 $a(CaONFJC)MIL269272 035 $a(EXLCZ)992670000000033303 100 $a20091229d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRadio frequency identification system security$b[electronic resource] $eRFIDsec'10 Asia workshop proceedings /$fedited by Yingjiu Li and Jianying Zhou 210 $aAmsterdam ;$aWashington, D.C. $cIOS Press$dc2010 215 $a1 online resource (172 p.) 225 1 $aCryptology and information security series,$x1871-6431 ;$vv. 4 300 $aDescription based upon print version of record. 311 $a1-60750-484-7 320 $aIncludes bibliographical references and indexes. 327 $aTitle page; Preface; Programme Committees; Contents; Securing Low-Cost RFID Systems: An Unconditionally Secure Approach; The Case for Dynamic RFID Tag Authentication; Practical RFID Ownership Transfer Scheme; An Efficient Ultralightweight Authentication Protocol for RFID Systems; Faster CRT-RSA Decryption Towards RFID Applications; Fingerprinting Radio Frequency Identification Tags Using Timing Characteristics; Security Flaws in a Recent Ultralightweight RFID Protocol; Semantic Access Control Model for RFID-Enabled Supply Chains; Security in the Internet of Things 327 $aSecuring RFID-Supported Supply ChainsOn Mitigating Covert Channels in RFID-Enabled Supply Chains; Anonymous RFID Yoking Protocol Using Error Correction Codes; Subject Index; Author Index 330 $aContains papers presented at the 2010 Workshop on Radio Frequency Identification Security (RFIDsec'10 Asia), held in Singapore on February 22-23, 2010. This book covers topics, including unconditionally secure RFID systems, dynamic RFID tag authentication, RFID ownership transfer, fingerprinting RFID tags, and secure RFID-supported supply chains. 410 0$aCryptology and information security series ;$vv. 4. 606 $aRadio frequency identification systems$xSecurity measures 615 0$aRadio frequency identification systems$xSecurity measures. 676 $a005.8 701 $aLi$b Yingjiu$0974712 701 $aZhou$b Jianying$0846249 712 12$aWorkshop on RFID Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910825466903321 996 $aRadio frequency identification system security$94001483 997 $aUNINA