Description |
1 online resource (x, 269 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 6370 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6370. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications |
Summary |
This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010, held in Istanbul, Turkey, in June 2010. The 17 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 47 submissions. The papers focus on approaches to solve security and data-protection issues in advanced contactless technologies like RFID. Topics addressed are new applications for secure RFID systems, data protection and privacy-enhancing techniques for RFID, cryptographic protocols for RFID, integration of secure RFID systems, resource-efficient implementation of cryptography, attacks on RFID systems, and RFID security hardware |
Bibliography |
Includes bibliographical references and index |
Notes |
English |
In |
Springer eBooks |
Subject |
Radio frequency identification systems -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Cryptography -- Congresses
|
|
Informatique.
|
|
Cryptography
|
|
Data encryption (Computer science)
|
|
Radio frequency identification systems
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Yalcin, Siddika Berna Ors
|
LC no. |
2010937761 |
ISBN |
9783642168222 |
|
3642168221 |
|
9783642168215 |
|
3642168213 |
|
1280390255 |
|
9781280390258 |
|
9786613568175 |
|
6613568171 |
|