LEADER 04811nam 22008175 450 001 996465693103316 005 20200706043034.0 010 $a1-280-39025-5 010 $a9786613568175 010 $a3-642-16822-1 024 7 $a10.1007/978-3-642-16822-2 035 $a(CKB)2550000000019913 035 $a(SSID)ssj0000446729 035 $a(PQKBManifestationID)11269704 035 $a(PQKBTitleCode)TC0000446729 035 $a(PQKBWorkID)10496876 035 $a(PQKB)11375083 035 $a(DE-He213)978-3-642-16822-2 035 $a(MiAaPQ)EBC3066054 035 $a(PPN)149029829 035 $a(EXLCZ)992550000000019913 100 $a20101030d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRadio Frequency Identification: Security and Privacy Issues$b[electronic resource] $e6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers /$fedited by Siddika Berna Ors Yalcin 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 271 p. 72 illus.) 225 1 $aSecurity and Cryptology ;$v6370 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-16821-3 320 $aIncludes bibliographical references and index. 327 $aInvited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. 410 0$aSecurity and Cryptology ;$v6370 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aSpecial purpose computers 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 608 $aKongress.$bswd 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aSpecial purpose computers. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a005.8 702 $aOrs Yalcin$b Siddika Berna$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aRFIDSec 2010 906 $aBOOK 912 $a996465693103316 996 $aRadio Frequency Identification: Security and Privacy Issues$92555846 997 $aUNISA