Muutke küpsiste eelistusi

E-raamat: Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers

  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 6370
  • Ilmumisaeg: 31-Oct-2010
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642168222
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 6370
  • Ilmumisaeg: 31-Oct-2010
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642168222

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

? RFIDSec2010,the6thworkshoponRFIDSecurity,washeldinIstanbul,Turkey, June 8-9, 2010. The workshop was sponsored by the FP7 Project ICE (Grant Agreement No: 206546) of The Scienti c and Technological Research Council of Turkey-National Research Institute of Electronics and Cryptology .. ? (TUBITAK-UEKAE). Theworkshopattractedarecordnumberof47submissionsfrom23countries, of which the Program Committee selected 17 for publication in the workshop proceedings,resulting in an acceptance rateof 40%. The review process followed strict standards: each paper received at least three reviews. The Program C- mittee included 31 members representing 13 countries and 5 continents. These members were carefully selected to represent academia, industry, and gove- ment,aswellastoincludeworld-classexpertsinvariousresearch eldsofinterest to RFIDSec. The Program Committee was supported by 38 external reviewers. Additionally, the workshop included three excellent invited talks. Ari Juels from RSA Laboratories discussed his vision of RFID security, in a talk entitled "The Physical Basis of RFID Security. " Pim Tuyls from Intrinsic-ID described his experiences in a talk entitled "Hardware Intrinsic Security. " Serge Vaudenay from EPFL discussed his vision of privacy in RFID systems in a talk entitled "Privacy Models for RFID Schemes. " I deeply thank A. Murat Apohan and Serhat Sa? gd co? , glu, the General Chair and Co-chair of RFIDSec 2010, for their excellent and always timely work on managing the local organization and orchestrating conference logistics. I would liketodeeplythank theSteeringCommittee ofRFIDSec fortheirtrust,constant support, guidance, and kind advice on many occasions.
Invited Talk 1
The Physical Basis of RFID Security
1(1)
Ari Juels
Session 1
Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model
2(20)
Nitesh Saxena
Jonathan Voris
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
22(13)
Julio Cesar Hernandez-Castro
Pedro Peris-Lopez
Raphael C.-W. Phan
Juan M.E. Tapiador
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
35(15)
Lishoy Francis
Gerhard Hancke
Keith Mayes
Konstantinos Markantonakis
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
50(15)
Gildas Avoine
Xavier Carpent
Benjamin Martin
Invited Talk 2
Privacy Models for RFID Schemes
65(1)
Serge Vaudenay
Session 2
On the Claimed Privacy of EC-RAC III
66(9)
Junfeng Fan
Jens Hermans
Frederik Vercauteren
EC-RAC: Enriching a Capacious RFID Attack Collection
75(16)
Ton van Deursen
Sasa Radomirovic
Anonymous RFID Authentication Using Trusted Computing Technologies
91(12)
Kurt Dietrich
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
103(20)
Gildas Avoine
Benjamin Martin
Tania Martin
Invited Talk 3
Hardware Intrinsic Security
123(1)
Pim Tayls
Session 3
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting
124(14)
Florian Kerschbaum
Nina Oertel
Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols
138(20)
Gildas Avoine
Iwen Coisel
Tania Martin
Anonymous Authentication for RFID Systems
158(18)
Frederik Armknccht
Liqun Chen
Ahmad-Reza Sadeghi
Christian Wachsmann
Leakage-Resilient RFID Authentication with Forward-Privacy
176(13)
Shin'ichiro Matsuo
Le Trieu Phong
Miyako Ohkubo
Moti Yung
Session 4
An ECDSA Processor for RFID Authentication
189(14)
Michael Hutter
Martin Feldhofer
Thomas Plos
Towards a Practical Solution to the RFID Desynchronization Problem
203(17)
Gerhard de Koning Gans
Flavio D. Garcia
Session 5
Optimal Security Limits of RFID Distance Bounding Protocols
220(19)
Orhun Kara
Suleyman Kardas
Muhammed Ali Bingol
Gildas Avoine
The Poulidor Distance-Bounding Protocol
239(19)
Rolando Trujillo-Rasua
Benjamin Martin
Gildas Avoine
A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications
258(13)
Elif Bilge Kavun
Tolga Yalcin
Author Index 271