Muutke küpsiste eelistusi

E-raamat: Radio Frequency Identification and IoT Security: 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised Selected Papers

  • Formaat: EPUB+DRM
  • Sari: Security and Cryptology 10155
  • Ilmumisaeg: 19-Jul-2017
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319620244
  • Formaat - EPUB+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Sari: Security and Cryptology 10155
  • Ilmumisaeg: 19-Jul-2017
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319620244

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on Radio Frequency Identification and IoT Security, RFIDSec 2016, held in Hong Kong, China, in November/December 2016.





The 14 revised full papers were carefully reviewed and selected from 30 submissions and are organized in topical sections on protocols; side channel and hardware; cards and tokens; proximity; and communication.
Protocols
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
3(14)
Masoumeh Safkhani
Hoda Jannati
Nasour Bagheri
PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks
17(13)
Hao Wang
Guangjie Han
Chunsheng Zhu
Sammy Chan
A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks
30(17)
Xiong Li
Jianwei Niu
Kim-Kwang Raymond Choo
Side Channel and Hardware
Energy Optimization of Unrolled Block Ciphers Using Combinational Checkpointing
47(15)
Siva Nishok Dhanuskodi
Daniel Holcomb
LDA-Based Clustering as a Side-Channel Distinguisher
62(14)
Rauf Mahmudlu
Valentina Banciu
Lejla Batina
Ileana Buhan
Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform
76(15)
Zhe Liu
Reza Azarderakhsh
Howon Kim
Hwajeong Seo
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
91(16)
Annelie Heuser
Stjepan Picek
Sylvain Guilley
Nele Mentens
Cards and Tokens
Enhancing EMV Tokenisation with Dynamic Transaction Tokens
107(16)
Danushka Jayasinghe
Konstanlinos Markantonakis
Raja Naeem Akram
Keith Mayes
Bias in the Mifare DESFire EVI TRNG
123(14)
Darren Hurley-Smith
Julio Hernandez-Castro
Proximity
Optimality Results on the Security of Lookup-Based Protocols
137(14)
Sjouke Mauw
Jorge Toro-Pozo
Rolando Trujillo-Rasua
Towards Quantum Distance Bounding Protocols
151(12)
Aysajan Abidin
Eduard Marin
Dave Singelee
Bart Preneel
Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing?
163(12)
Yunhui Zhuang
Alvin Chung Man Leung
James Hughes
Communication
μProxy: A Hardware Relay for Anonymous and Secure Internet Access
175(13)
David Cox
David Oswald
Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks
188(17)
Qiao Hu
Gerhard Hancke
Author Index 205