Radio Frequency Identification: Security and Privacy Issues [recurso electrónico] : 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers / edited by Siddika Berna Ors Yalcin.

Por: Ors Yalcin, Siddika Berna [editor.]Colaborador(es): SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 6370Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: X, 271p. 72 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642168222Tema(s): Computer science | Computer Communication Networks | Software engineering | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Computer Communication Networks | Data Encryption | Systems and Data Security | Algorithm Analysis and Problem Complexity | Management of Computing and Information Systems | Special Purpose and Application-Based SystemsFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 004.6 Clasificación LoC:TK5105.5-5105.9Recursos en línea: Libro electrónicoTexto
Contenidos:
Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications.
En: Springer eBooksResumen: ? RFIDSec2010,the6thworkshoponRFIDSecurity,washeldinIstanbul,Turkey, June 8–9, 2010. The workshop was sponsored by the FP7 Project ICE (Grant Agreement No: 206546) of The Scienti?c and Technological Research Council of Turkey—National Research Institute of Electronics and Cryptology ¨ ? (TUBITAK-UEKAE). Theworkshopattractedarecordnumberof47submissionsfrom23countries, of which the Program Committee selected 17 for publication in the workshop proceedings,resulting in an acceptance rateof 40%. The review process followed strict standards: each paper received at least three reviews. The Program C- mittee included 31 members representing 13 countries and 5 continents. These members were carefully selected to represent academia, industry, and gove- ment,aswellastoincludeworld-classexpertsinvariousresearch?eldsofinterest to RFIDSec. The Program Committee was supported by 38 external reviewers. Additionally, the workshop included three excellent invited talks. Ari Juels from RSA Laboratories discussed his vision of RFID security, in a talk entitled “The Physical Basis of RFID Security. ” Pim Tuyls from Intrinsic-ID described his experiences in a talk entitled “Hardware Intrinsic Security. ” Serge Vaudenay from EPFL discussed his vision of privacy in RFID systems in a talk entitled “Privacy Models for RFID Schemes. ” I deeply thank A. Murat Apohan and Serhat Sa? gd?co? ¸ glu, the General Chair and Co-chair of RFIDSec 2010, for their excellent and always timely work on managing the local organization and orchestrating conference logistics. I would liketodeeplythank theSteeringCommittee ofRFIDSec fortheirtrust,constant support, guidance, and kind advice on many occasions.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos TK5105.5 -5105.9 (Browse shelf(Abre debajo)) 1 No para préstamo 375409-2001

Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications.

? RFIDSec2010,the6thworkshoponRFIDSecurity,washeldinIstanbul,Turkey, June 8–9, 2010. The workshop was sponsored by the FP7 Project ICE (Grant Agreement No: 206546) of The Scienti?c and Technological Research Council of Turkey—National Research Institute of Electronics and Cryptology ¨ ? (TUBITAK-UEKAE). Theworkshopattractedarecordnumberof47submissionsfrom23countries, of which the Program Committee selected 17 for publication in the workshop proceedings,resulting in an acceptance rateof 40%. The review process followed strict standards: each paper received at least three reviews. The Program C- mittee included 31 members representing 13 countries and 5 continents. These members were carefully selected to represent academia, industry, and gove- ment,aswellastoincludeworld-classexpertsinvariousresearch?eldsofinterest to RFIDSec. The Program Committee was supported by 38 external reviewers. Additionally, the workshop included three excellent invited talks. Ari Juels from RSA Laboratories discussed his vision of RFID security, in a talk entitled “The Physical Basis of RFID Security. ” Pim Tuyls from Intrinsic-ID described his experiences in a talk entitled “Hardware Intrinsic Security. ” Serge Vaudenay from EPFL discussed his vision of privacy in RFID systems in a talk entitled “Privacy Models for RFID Schemes. ” I deeply thank A. Murat Apohan and Serhat Sa? gd?co? ¸ glu, the General Chair and Co-chair of RFIDSec 2010, for their excellent and always timely work on managing the local organization and orchestrating conference logistics. I would liketodeeplythank theSteeringCommittee ofRFIDSec fortheirtrust,constant support, guidance, and kind advice on many occasions.

19

Con tecnología Koha