Radio Frequency Identification System Security :: RFIDsec'13 Asia Workshop Proceedings /
Our reliance on ever more sophisticated computer systems for the management of data and information means that the field of security and privacy technology continues to be of crucial importance to us all. This book presents ten peer-reviewed papers from the 2013 workshop Radio Frequency Identificati...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam :
IOS Press,
©2013.
©2013 |
Schriftenreihe: | Cryptology and information security series ;
v. 11. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Our reliance on ever more sophisticated computer systems for the management of data and information means that the field of security and privacy technology continues to be of crucial importance to us all. This book presents ten peer-reviewed papers from the 2013 workshop Radio Frequency Identification/Internet of Things Security (RFIDsec'13 Asia) held in Guangzhou, China, in November 2013. This is the fifth of a series of workshops organized by the Asian branch of RFIDsec, which provides a platform for researchers, enterprises and governments to investigate, discuss and propose new solutions fo. |
Beschreibung: | International conference proceedings. Includes indexes. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and indexes. |
ISBN: | 9781614993285 1614993289 1306284740 9781306284745 1614993270 9781614993278 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn867820949 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 140110s2013 ne ob 101 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d EBLCP |d IOSPR |d N$T |d YDXCP |d E7B |d OCLCQ |d DEBSZ |d NKT |d AZK |d AGLDB |d MOR |d PIFAG |d ZCU |d MERUC |d OCLCQ |d U3W |d STF |d OCLCF |d OCLCO |d VTS |d NRAMU |d CRU |d ICG |d OCLCQ |d VT2 |d OCLCQ |d WYU |d S4S |d DKC |d OCLCQ |d M8D |d OCLCQ |d SFB |d AJS |d OCLCO |d QGK |d OCLCQ |d OCLCO | ||
019 | |a 879631872 |a 961642073 |a 962636398 |a 1055355461 |a 1066599151 |a 1081226116 |a 1228584706 |a 1259099277 | ||
020 | |a 9781614993285 |q (electronic bk.) | ||
020 | |a 1614993289 |q (electronic bk.) | ||
020 | |a 1306284740 |q (electronic bk.) | ||
020 | |a 9781306284745 |q (electronic bk.) | ||
020 | |a 1614993270 | ||
020 | |a 9781614993278 | ||
020 | |z 9781614993278 | ||
035 | |a (OCoLC)867820949 |z (OCoLC)879631872 |z (OCoLC)961642073 |z (OCoLC)962636398 |z (OCoLC)1055355461 |z (OCoLC)1066599151 |z (OCoLC)1081226116 |z (OCoLC)1228584706 |z (OCoLC)1259099277 | ||
037 | |a 559725 |b MIL | ||
050 | 4 | |a TK6570.I34 |b R45 2013 | |
072 | 7 | |a COM |x COM014000 |2 bisacsh | |
072 | 7 | |a TEC |x 009070 |2 bisacsh | |
082 | 7 | |a 621.3841/92 |2 23 | |
082 | 7 | |a 005.8 | |
049 | |a MAIN | ||
111 | 2 | |a RFIDSec (Workshop) |d (2013 : |c Guangzhou, China) | |
245 | 1 | 0 | |a Radio Frequency Identification System Security : |b RFIDsec'13 Asia Workshop Proceedings / |c edited by Changshe Ma and Jian Weng. |
246 | 3 | |a RFIDsec'13 | |
260 | |a Amsterdam : |b IOS Press, |c ©2013. | ||
264 | 4 | |c ©2013 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptology and Information Security Series ; |v v. 11 | |
500 | |a International conference proceedings. | ||
500 | |a Includes indexes. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and indexes. | ||
505 | 0 | |a Title Page; Preface; Organization of the 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia) 27 Nov, 2013, Guangzhou, China; Contents; Regular Papers; On RFID Authentication Protocols with Wide-Strong Privacy; Chameleon RFID and Tracking Prevention; A Secure Elliptic Curve Based RFID Ownership Transfer Scheme with Controlled Delegation; IBIHOP: Proper Privacy Preserving Mutual RFID Authentication; A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power; SSL Usage in Commercial Internet of Things Platforms | |
505 | 8 | |a A Comparative Study of Stream Ciphers and Hash Functions for RFID AuthenticationsShort Papers; Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions; Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions; A Survey of Side Channel Attacks on MPKCs Potential for RFID; Subject Index; Author Index | |
520 | |a Our reliance on ever more sophisticated computer systems for the management of data and information means that the field of security and privacy technology continues to be of crucial importance to us all. This book presents ten peer-reviewed papers from the 2013 workshop Radio Frequency Identification/Internet of Things Security (RFIDsec'13 Asia) held in Guangzhou, China, in November 2013. This is the fifth of a series of workshops organized by the Asian branch of RFIDsec, which provides a platform for researchers, enterprises and governments to investigate, discuss and propose new solutions fo. | ||
546 | |a English. | ||
650 | 0 | |a Radio frequency identification systems |x Security measures |v Congresses. | |
650 | 6 | |a Systèmes d'identification par radiofréquence |x Sécurité |x Mesures |v Congrès. | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Mechanical. |2 bisacsh | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Ma, C. | |
700 | 1 | |a Weng, Jian. | |
776 | 0 | 8 | |i Print version: |z 9781306284745 |
830 | 0 | |a Cryptology and information security series ; |v v. 11. |0 http://id.loc.gov/authorities/names/no2008086431 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=683325 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1589001 | ||
938 | |a ebrary |b EBRY |n ebr10827967 | ||
938 | |a EBSCOhost |b EBSC |n 683325 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis27260844 | ||
938 | |a YBP Library Services |b YANK |n 11560694 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn867820949 |
---|---|
_version_ | 1816882255847489536 |
adam_text | |
any_adam_object | |
author2 | Ma, C. Weng, Jian |
author2_role | |
author2_variant | c m cm j w jw |
author_corporate | RFIDSec (Workshop) Guangzhou, China) |
author_corporate_role | |
author_facet | Ma, C. Weng, Jian RFIDSec (Workshop) Guangzhou, China) |
author_sort | RFIDSec (Workshop) Guangzhou, China) |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK6570 |
callnumber-raw | TK6570.I34 R45 2013 |
callnumber-search | TK6570.I34 R45 2013 |
callnumber-sort | TK 46570 I34 R45 42013 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Title Page; Preface; Organization of the 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia) 27 Nov, 2013, Guangzhou, China; Contents; Regular Papers; On RFID Authentication Protocols with Wide-Strong Privacy; Chameleon RFID and Tracking Prevention; A Secure Elliptic Curve Based RFID Ownership Transfer Scheme with Controlled Delegation; IBIHOP: Proper Privacy Preserving Mutual RFID Authentication; A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power; SSL Usage in Commercial Internet of Things Platforms A Comparative Study of Stream Ciphers and Hash Functions for RFID AuthenticationsShort Papers; Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions; Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions; A Survey of Side Channel Attacks on MPKCs Potential for RFID; Subject Index; Author Index |
ctrlnum | (OCoLC)867820949 |
dewey-full | 621.3841/92 005.8 |
dewey-hundreds | 600 - Technology (Applied sciences) 000 - Computer science, information, general works |
dewey-ones | 621 - Applied physics 005 - Computer programming, programs, data, security |
dewey-raw | 621.3841/92 005.8 |
dewey-search | 621.3841/92 005.8 |
dewey-sort | 3621.3841 292 |
dewey-tens | 620 - Engineering and allied operations 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04485cam a2200709 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn867820949</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">140110s2013 ne ob 101 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">IOSPR</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">NKT</subfield><subfield code="d">AZK</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">CRU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">S4S</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">879631872</subfield><subfield code="a">961642073</subfield><subfield code="a">962636398</subfield><subfield code="a">1055355461</subfield><subfield code="a">1066599151</subfield><subfield code="a">1081226116</subfield><subfield code="a">1228584706</subfield><subfield code="a">1259099277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614993285</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614993289</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306284740</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306284745</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614993270</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614993278</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614993278</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)867820949</subfield><subfield code="z">(OCoLC)879631872</subfield><subfield code="z">(OCoLC)961642073</subfield><subfield code="z">(OCoLC)962636398</subfield><subfield code="z">(OCoLC)1055355461</subfield><subfield code="z">(OCoLC)1066599151</subfield><subfield code="z">(OCoLC)1081226116</subfield><subfield code="z">(OCoLC)1228584706</subfield><subfield code="z">(OCoLC)1259099277</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">559725</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK6570.I34</subfield><subfield code="b">R45 2013</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">009070</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">621.3841/92</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">RFIDSec (Workshop)</subfield><subfield code="d">(2013 :</subfield><subfield code="c">Guangzhou, China)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Radio Frequency Identification System Security :</subfield><subfield code="b">RFIDsec'13 Asia Workshop Proceedings /</subfield><subfield code="c">edited by Changshe Ma and Jian Weng.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">RFIDsec'13</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2013.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and Information Security Series ;</subfield><subfield code="v">v. 11</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">International conference proceedings.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes indexes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title Page; Preface; Organization of the 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia) 27 Nov, 2013, Guangzhou, China; Contents; Regular Papers; On RFID Authentication Protocols with Wide-Strong Privacy; Chameleon RFID and Tracking Prevention; A Secure Elliptic Curve Based RFID Ownership Transfer Scheme with Controlled Delegation; IBIHOP: Proper Privacy Preserving Mutual RFID Authentication; A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power; SSL Usage in Commercial Internet of Things Platforms</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A Comparative Study of Stream Ciphers and Hash Functions for RFID AuthenticationsShort Papers; Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions; Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions; A Survey of Side Channel Attacks on MPKCs Potential for RFID; Subject Index; Author Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Our reliance on ever more sophisticated computer systems for the management of data and information means that the field of security and privacy technology continues to be of crucial importance to us all. This book presents ten peer-reviewed papers from the 2013 workshop Radio Frequency Identification/Internet of Things Security (RFIDsec'13 Asia) held in Guangzhou, China, in November 2013. This is the fifth of a series of workshops organized by the Asian branch of RFIDsec, which provides a platform for researchers, enterprises and governments to investigate, discuss and propose new solutions fo.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Radio frequency identification systems</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes d'identification par radiofréquence</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Mechanical.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ma, C.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Weng, Jian.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9781306284745</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 11.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008086431</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=683325</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1589001</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10827967</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">683325</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis27260844</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11560694</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn867820949 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:43Z |
institution | BVB |
isbn | 9781614993285 1614993289 1306284740 9781306284745 1614993270 9781614993278 |
language | English |
oclc_num | 867820949 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IOS Press, |
record_format | marc |
series | Cryptology and information security series ; |
series2 | Cryptology and Information Security Series ; |
spelling | RFIDSec (Workshop) (2013 : Guangzhou, China) Radio Frequency Identification System Security : RFIDsec'13 Asia Workshop Proceedings / edited by Changshe Ma and Jian Weng. RFIDsec'13 Amsterdam : IOS Press, ©2013. ©2013 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Cryptology and Information Security Series ; v. 11 International conference proceedings. Includes indexes. Print version record. Includes bibliographical references and indexes. Title Page; Preface; Organization of the 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia) 27 Nov, 2013, Guangzhou, China; Contents; Regular Papers; On RFID Authentication Protocols with Wide-Strong Privacy; Chameleon RFID and Tracking Prevention; A Secure Elliptic Curve Based RFID Ownership Transfer Scheme with Controlled Delegation; IBIHOP: Proper Privacy Preserving Mutual RFID Authentication; A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power; SSL Usage in Commercial Internet of Things Platforms A Comparative Study of Stream Ciphers and Hash Functions for RFID AuthenticationsShort Papers; Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions; Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions; A Survey of Side Channel Attacks on MPKCs Potential for RFID; Subject Index; Author Index Our reliance on ever more sophisticated computer systems for the management of data and information means that the field of security and privacy technology continues to be of crucial importance to us all. This book presents ten peer-reviewed papers from the 2013 workshop Radio Frequency Identification/Internet of Things Security (RFIDsec'13 Asia) held in Guangzhou, China, in November 2013. This is the fifth of a series of workshops organized by the Asian branch of RFIDsec, which provides a platform for researchers, enterprises and governments to investigate, discuss and propose new solutions fo. English. Radio frequency identification systems Security measures Congresses. Systèmes d'identification par radiofréquence Sécurité Mesures Congrès. TECHNOLOGY & ENGINEERING Mechanical. bisacsh Conference papers and proceedings fast Ma, C. Weng, Jian. Print version: 9781306284745 Cryptology and information security series ; v. 11. http://id.loc.gov/authorities/names/no2008086431 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=683325 Volltext |
spellingShingle | Radio Frequency Identification System Security : RFIDsec'13 Asia Workshop Proceedings / Cryptology and information security series ; Title Page; Preface; Organization of the 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia) 27 Nov, 2013, Guangzhou, China; Contents; Regular Papers; On RFID Authentication Protocols with Wide-Strong Privacy; Chameleon RFID and Tracking Prevention; A Secure Elliptic Curve Based RFID Ownership Transfer Scheme with Controlled Delegation; IBIHOP: Proper Privacy Preserving Mutual RFID Authentication; A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power; SSL Usage in Commercial Internet of Things Platforms A Comparative Study of Stream Ciphers and Hash Functions for RFID AuthenticationsShort Papers; Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions; Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions; A Survey of Side Channel Attacks on MPKCs Potential for RFID; Subject Index; Author Index Radio frequency identification systems Security measures Congresses. Systèmes d'identification par radiofréquence Sécurité Mesures Congrès. TECHNOLOGY & ENGINEERING Mechanical. bisacsh |
title | Radio Frequency Identification System Security : RFIDsec'13 Asia Workshop Proceedings / |
title_alt | RFIDsec'13 |
title_auth | Radio Frequency Identification System Security : RFIDsec'13 Asia Workshop Proceedings / |
title_exact_search | Radio Frequency Identification System Security : RFIDsec'13 Asia Workshop Proceedings / |
title_full | Radio Frequency Identification System Security : RFIDsec'13 Asia Workshop Proceedings / edited by Changshe Ma and Jian Weng. |
title_fullStr | Radio Frequency Identification System Security : RFIDsec'13 Asia Workshop Proceedings / edited by Changshe Ma and Jian Weng. |
title_full_unstemmed | Radio Frequency Identification System Security : RFIDsec'13 Asia Workshop Proceedings / edited by Changshe Ma and Jian Weng. |
title_short | Radio Frequency Identification System Security : |
title_sort | radio frequency identification system security rfidsec 13 asia workshop proceedings |
title_sub | RFIDsec'13 Asia Workshop Proceedings / |
topic | Radio frequency identification systems Security measures Congresses. Systèmes d'identification par radiofréquence Sécurité Mesures Congrès. TECHNOLOGY & ENGINEERING Mechanical. bisacsh |
topic_facet | Radio frequency identification systems Security measures Congresses. Systèmes d'identification par radiofréquence Sécurité Mesures Congrès. TECHNOLOGY & ENGINEERING Mechanical. Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=683325 |
work_keys_str_mv | AT rfidsecworkshopguangzhouchina radiofrequencyidentificationsystemsecurityrfidsec13asiaworkshopproceedings AT mac radiofrequencyidentificationsystemsecurityrfidsec13asiaworkshopproceedings AT wengjian radiofrequencyidentificationsystemsecurityrfidsec13asiaworkshopproceedings AT rfidsecworkshopguangzhouchina rfidsec13 AT mac rfidsec13 AT wengjian rfidsec13 |