Radio Frequency Identification: Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and select...

Full description

Bibliographic Details
Other Authors: Hoepman, Jaap-Henk (Editor), Verbauwhede, Ingrid (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2013, 2013
Edition:1st ed. 2013
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03825nmm a2200421 u 4500
001 EB000391066
003 EBX01000000000000000244119
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642361401 
100 1 |a Hoepman, Jaap-Henk  |e [editor] 
245 0 0 |a Radio Frequency Identification: Security and Privacy Issues  |h Elektronische Ressource  |b 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers  |c edited by Jaap-Henk Hoepman, Ingrid Verbauwhede 
250 |a 1st ed. 2013 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2013, 2013 
300 |a X, 181 p. 37 illus  |b online resource 
505 0 |a On the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification 
653 |a Computer Communication Networks 
653 |a Electronic commerce 
653 |a Cryptography 
653 |a Computer networks  
653 |a Computer Application in Administrative Data Processing 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a e-Commerce and e-Business 
653 |a Data and Information Security 
653 |a Information technology / Management 
653 |a Special Purpose and Application-Based Systems 
653 |a Computers, Special purpose 
700 1 |a Verbauwhede, Ingrid  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-642-36140-1 
856 4 0 |u https://doi.org/10.1007/978-3-642-36140-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies