Radio Frequency Identification. Security and Privacy Issues [E-Book] : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers / edited by Jaap-Henk Hoepman, Ingrid Verbauwhede.
Hoepman, Jaap-Henk.
Verbauwhede, Ingrid.
Berlin, Heidelberg : Springer, 2013
X, 181 p. 37 illus. digital.
englisch
9783642361401
10.1007/978-3-642-36140-1
Lecture notes in computer science ; 7739
Full Text
Table of Contents:
  • On the Security of Tan et al. Serverless RFID Authentication and Search Protocols
  • Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.et al. Serverless RFID Authentication and Search Protocols
  • Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.