RFID Security and Privacy: Concepts, Protocols, and ArchitecturesSpringer Science & Business Media, 18/04/2008 - 269 من الصفحات In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: “There must exist better solutions. ” I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ̈ , whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security,privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ̈ supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own. |
المحتوى
1 | |
7 | |
Analysis and Modeling | 57 |
Securing RFID Systems | 81 |
Pseudonymization Infrastructures | 145 |
Extending the RFID System Model 181 | 180 |
Current Research | 199 |
List of Figures | 247 |
265 | |
طبعات أخرى - عرض جميع المقتطفات
عبارات ومصطلحات مألوفة
able additional already applications approach architecture attacker authentication backend basic become calculated channel chapter characteristics communication complete computation concept created cryptographic database depends devices discussed encryption ensured epoch example figure forward given goals hash functions hash value hash-based identity implementation infrastructure instance internal introduced layer legitimate entity limited location zone entity logical location zone means modification needs node identifiers object obtain operation owner pairs party path performed physical location zone possible practice presented primitives problem protection protocol pseudonym random reader reading receiver regarding relevant request respective responsible result revealed RFID systems RFID tags scheme secret security and privacy sent shared shown single solution stored subsection tag bearer tag identifier tag query technical tracking transaction trust update
مقاطع مشهورة
الصفحة 3 - The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.
الصفحة 260 - D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In B.