Muutke küpsiste eelistusi

Radio Frequency Identification and IoT Security: 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised Selected Papers 1st ed. 2017 [Pehme köide]

  • Formaat: Paperback / softback, 205 pages, kõrgus x laius: 235x155 mm, kaal: 3343 g, 56 Illustrations, black and white; X, 205 p. 56 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 10155
  • Ilmumisaeg: 20-Jul-2017
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319620231
  • ISBN-13: 9783319620237
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 205 pages, kõrgus x laius: 235x155 mm, kaal: 3343 g, 56 Illustrations, black and white; X, 205 p. 56 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 10155
  • Ilmumisaeg: 20-Jul-2017
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319620231
  • ISBN-13: 9783319620237
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on Radio Frequency Identification and IoT Security, RFIDSec 2016, held in Hong Kong, China, in November/December 2016.





The 14 revised full papers were carefully reviewed and selected from 30 submissions and are organized in topical sections on protocols; side channel and hardware; cards and tokens; proximity; and communication.
Protocols
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
3(14)
Masoumeh Safkhani
Hoda Jannati
Nasour Bagheri
PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks
17(13)
Hao Wang
Guangjie Han
Chunsheng Zhu
Sammy Chan
A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks
30(17)
Xiong Li
Jianwei Niu
Kim-Kwang Raymond Choo
Side Channel and Hardware
Energy Optimization of Unrolled Block Ciphers Using Combinational Checkpointing
47(15)
Siva Nishok Dhanuskodi
Daniel Holcomb
LDA-Based Clustering as a Side-Channel Distinguisher
62(14)
Rauf Mahmudlu
Valentina Banciu
Lejla Batina
Ileana Buhan
Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform
76(15)
Zhe Liu
Reza Azarderakhsh
Howon Kim
Hwajeong Seo
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
91(16)
Annelie Heuser
Stjepan Picek
Sylvain Guilley
Nele Mentens
Cards and Tokens
Enhancing EMV Tokenisation with Dynamic Transaction Tokens
107(16)
Danushka Jayasinghe
Konstanlinos Markantonakis
Raja Naeem Akram
Keith Mayes
Bias in the Mifare DESFire EVI TRNG
123(14)
Darren Hurley-Smith
Julio Hernandez-Castro
Proximity
Optimality Results on the Security of Lookup-Based Protocols
137(14)
Sjouke Mauw
Jorge Toro-Pozo
Rolando Trujillo-Rasua
Towards Quantum Distance Bounding Protocols
151(12)
Aysajan Abidin
Eduard Marin
Dave Singelee
Bart Preneel
Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing?
163(12)
Yunhui Zhuang
Alvin Chung Man Leung
James Hughes
Communication
μProxy: A Hardware Relay for Anonymous and Secure Internet Access
175(13)
David Cox
David Oswald
Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks
188(17)
Qiao Hu
Gerhard Hancke
Author Index 205