LEADER 05505nam 22007935 450 001 996466270503316 005 20200703041418.0 010 $a3-642-36139-0 024 7 $a10.1007/978-3-642-36140-1 035 $a(CKB)3400000000125721 035 $a(SSID)ssj0000880060 035 $a(PQKBManifestationID)11546669 035 $a(PQKBTitleCode)TC0000880060 035 $a(PQKBWorkID)10894990 035 $a(PQKB)11538322 035 $a(DE-He213)978-3-642-36140-1 035 $a(MiAaPQ)EBC3093264 035 $a(PPN)168329824 035 $a(EXLCZ)993400000000125721 100 $a20130129d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRadio Frequency Identification: Security and Privacy Issues$b[electronic resource] $e8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers /$fedited by Jaap-Henk Hoepman, Ingrid Verbauwhede 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 181 p. 37 illus.) 225 1 $aSecurity and Cryptology ;$v7739 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-36140-4 327 $aOn the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. 330 $aThis book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies. 410 0$aSecurity and Cryptology ;$v7739 606 $aComputer security 606 $aData encryption (Computer science) 606 $aApplication software 606 $aE-commerce 606 $aComputer communication systems 606 $aSpecial purpose computers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aE-commerce. 615 0$aComputer communication systems. 615 0$aSpecial purpose computers. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Appl. in Administrative Data Processing. 615 24$ae-Commerce/e-business. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a621.384192 702 $aHoepman$b Jaap-Henk$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVerbauwhede$b Ingrid$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466270503316 996 $aRadio Frequency Identification: Security and Privacy Issues$92555846 997 $aUNISA