Radio frequency identification: security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7739 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (X, 179 S.) |
ISBN: | 9783642361401 |
DOI: | 10.1007/978-3-642-36140-1 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040937373 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 130410s2013 gw o|||| 10||| eng d | ||
015 | |a 13,N01 |2 dnb | ||
020 | |a 9783642361401 |c Online |9 978-3-642-36140-1 | ||
024 | 7 | |a 10.1007/978-3-642-36140-1 |2 doi | |
035 | |a (OCoLC)830902155 | ||
035 | |a (DE-599)BVBBV040937373 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-Aug4 |a DE-859 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a 004 |2 sdnb | ||
084 | |a ELT 712f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Radio frequency identification |b security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers |c Jaap-Henk Hoepman ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (X, 179 S.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7739 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a RFID |0 (DE-588)4509863-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Nimwegen |2 gnd-content | |
689 | 0 | 0 | |a RFID |0 (DE-588)4509863-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Hoepman, Jaap-Henk |e Sonstige |4 oth | |
711 | 2 | |a RFIDSec |n 8 |d 2012 |c Nimwegen |j Sonstige |0 (DE-588)1033288918 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-36139-5 |
830 | 0 | |a Lecture notes in computer science |v 7739 |w (DE-604)BV014880109 |9 7739 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-36140-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025916198&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025916198&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
912 | |a ZDB-2-SCS | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025916198 |
Datensatz im Suchindex
_version_ | 1820875456969179136 |
---|---|
adam_text |
RADIO FREQUENCY IDENTIFICATION. SECURITY AND PRIVACY ISSUES
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
ON THE SECURITY OF TAN ET AL. SERVERLESS RFID AUTHENTICATION AND SEARCH
PROTOCOLS
YET ANOTHER ULTRALIGHTWEIGHT AUTHENTICATION PROTOCOL THAT IS
BROKEN.-IMPROVED ANONYMITY FOR KEY-TREES-HIDDEN BITS APPROACH FOR
AUTHENTICATION IN RFID SYSTEMS.-DESIGNATED ATTRIBUTE-BASED PROOFS FOR
RFID APPLICATIONS.-T-MATCH: PRIVACY-PRESERVING ITEM MATCHING FOR
STORAGE-ONLY RFID TAGS.-PRIVATE YOKING PROOFS: ATTACKS, MODELS AND NEW
PROVABLE CONSTRUCTIONS.-PRIVACY PRESERVING PAYMENTS ON COMPUTATIONAL
RFID DEVICES WITH APPLICATION IN INTELLIGENT TRANSPORTATION
SYSTEMS.-WEAKENING PASSPORTS THROUGH BAD IMPLEMENTATIONS.-NEVER
TRUST A BUNNY.-ON USING INSTRUCTION-SET EXTENSIONS FOR MINIMIZING THE
HARDWARE-IMPLEMENTATION COSTS OF SYMMETRIC-KEY ALGORITHMS ON A
LOW-RESOURCE MICROCONTROLLER.-DRV-FINGERPRINTING: USING DATA RETENTION
VOLTAGE OF SRAM CELLS FOR CHIP IDENTIFICATION. ET AL. SERVERLESS RFID
AUTHENTICATION AND SEARCH PROTOCOLS
YET ANOTHER ULTRALIGHTWEIGHT AUTHENTICATION PROTOCOL THAT IS
BROKEN.-IMPROVED ANONYMITY FOR KEY-TREES-HIDDEN BITS APPROACH FOR
AUTHENTICATION IN RFID SYSTEMS.-DESIGNATED ATTRIBUTE-BASED PROOFS FOR
RFID APPLICATIONS.-T-MATCH: PRIVACY-PRESERVING ITEM MATCHING FOR
STORAGE-ONLY RFID TAGS.-PRIVATE YOKING PROOFS: ATTACKS, MODELS AND NEW
PROVABLE CONSTRUCTIONS.-PRIVACY PRESERVING PAYMENTS ON COMPUTATIONAL
RFID DEVICES WITH APPLICATION IN INTELLIGENT TRANSPORTATION
SYSTEMS.-WEAKENING PASSPORTS THROUGH BAD IMPLEMENTATIONS.-NEVER
TRUST A BUNNY.-ON USING INSTRUCTION-SET EXTENSIONS FOR MINIMIZING THE
HARDWARE-IMPLEMENTATION COSTS OF SYMMETRIC-KEY ALGORITHMS ON A
LOW-RESOURCE MICROCONTROLLER.-DRV-FINGERPRINTING: USING DATA RETENTION
VOLTAGE OF SRAM CELLS FOR CHIP IDENTIFICATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
RADIO FREQUENCY IDENTIFICATION. SECURITY AND PRIVACY ISSUES
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-WORKSOP PROCEEDINGS
OF THE 8TH INTERNATIONAL WORKSHOP RADIO FREQUENCY IDENTIFICATION:
SECURITY AND PRIVACY ISSUES, RFIDSEC 2012, HELD IN NIJMEGEN, THE
NETHERLANDS, IN JULY 2012. THE 12 REVISED FULL PAPERS PRESENTED WERE
CAREFULLY REVIEWED AND SELECTED FROM 29 SUBMISSIONS FOR INCLUSION IN THE
BOOK. THE PAPERS FOCUS ON APPROACHES TO SOLVE SECURITY AND DATA
PROTECTION ISSUES IN ADVANCED CONTACTLESS TECHNOLOGIES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040937373 |
classification_rvk | SS 4800 |
classification_tum | ELT 712f DAT 000 DAT 465f |
collection | ZDB-2-LNC ZDB-2-SCS |
ctrlnum | (OCoLC)830902155 (DE-599)BVBBV040937373 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik |
doi_str_mv | 10.1007/978-3-642-36140-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040937373</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130410s2013 gw o|||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N01</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642361401</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-36140-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-36140-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)830902155</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040937373</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ELT 712f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Radio frequency identification</subfield><subfield code="b">security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers</subfield><subfield code="c">Jaap-Henk Hoepman ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 179 S.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7739</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Nimwegen</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hoepman, Jaap-Henk</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">RFIDSec</subfield><subfield code="n">8</subfield><subfield code="d">2012</subfield><subfield code="c">Nimwegen</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1033288918</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-36139-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7739</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7739</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-36140-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025916198&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025916198&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025916198</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Nimwegen gnd-content |
genre_facet | Konferenzschrift 2012 Nimwegen |
id | DE-604.BV040937373 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:15:56Z |
institution | BVB |
institution_GND | (DE-588)1033288918 |
isbn | 9783642361401 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025916198 |
oclc_num | 830902155 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-Aug4 DE-859 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-Aug4 DE-859 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (X, 179 S.) |
psigel | ZDB-2-LNC ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Radio frequency identification security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers Jaap-Henk Hoepman ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (X, 179 S.) txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7739 Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf RFID (DE-588)4509863-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Nimwegen gnd-content RFID (DE-588)4509863-3 s Datensicherung (DE-588)4011144-1 s Privatsphäre (DE-588)4123980-5 s Authentifikation (DE-588)4330656-1 s Kryptoanalyse (DE-588)4830502-9 s DE-604 Hoepman, Jaap-Henk Sonstige oth RFIDSec 8 2012 Nimwegen Sonstige (DE-588)1033288918 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-36139-5 Lecture notes in computer science 7739 (DE-604)BV014880109 7739 https://doi.org/10.1007/978-3-642-36140-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025916198&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025916198&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Radio frequency identification security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd RFID (DE-588)4509863-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)4509863-3 (DE-588)4830502-9 (DE-588)1071861417 |
title | Radio frequency identification security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers |
title_auth | Radio frequency identification security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers |
title_exact_search | Radio frequency identification security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers |
title_full | Radio frequency identification security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers Jaap-Henk Hoepman ... (eds.) |
title_fullStr | Radio frequency identification security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers Jaap-Henk Hoepman ... (eds.) |
title_full_unstemmed | Radio frequency identification security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers Jaap-Henk Hoepman ... (eds.) |
title_short | Radio frequency identification |
title_sort | radio frequency identification security and privacy issues 8th international workshop rfidsec 2012 nijmegen the netherlands july 2 3 2012 revised selected papers |
title_sub | security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 ; revised selected papers |
topic | Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd RFID (DE-588)4509863-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Datensicherung Authentifikation Privatsphäre RFID Kryptoanalyse Konferenzschrift 2012 Nimwegen |
url | https://doi.org/10.1007/978-3-642-36140-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025916198&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025916198&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT hoepmanjaaphenk radiofrequencyidentificationsecurityandprivacyissues8thinternationalworkshoprfidsec2012nijmegenthenetherlandsjuly232012revisedselectedpapers AT rfidsecnimwegen radiofrequencyidentificationsecurityandprivacyissues8thinternationalworkshoprfidsec2012nijmegenthenetherlandsjuly232012revisedselectedpapers |