000 03521nam a22005895i 4500
001 978-3-319-47545-5
003 DE-He213
005 20220801222212.0
007 cr nn 008mamaa
008 161111s2017 sz | s |||| 0|eng d
020 _a9783319475455
_9978-3-319-47545-5
024 7 _a10.1007/978-3-319-47545-5
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aKhattab, Ahmed.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_960248
245 1 0 _aRFID Security
_h[electronic resource] :
_bA Lightweight Paradigm /
_cby Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXXII, 171 p. 80 illus., 61 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAnalog Circuits and Signal Processing,
_x2197-1854
505 0 _aPart I. RFID Security Preliminaries -- 1. Introduction to RFID -- 2. RFID Security Threats and Basic Solutions -- 3. Cryptography in RFID Systems -- Part II. Lightweight RFID Redundant Bit Security -- 4. RBS Cryptosystem -- 5. RBS Security Analysis -- 6. RBS Performance Evaluation -- 7. RBS RFID Security and The Internet of Things.
520 _aThis book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.
650 0 _aElectronic circuits.
_919581
650 0 _aMicroprocessors.
_960249
650 0 _aComputer architecture.
_93513
650 0 _aSignal processing.
_94052
650 1 4 _aElectronic Circuits and Systems.
_960250
650 2 4 _aProcessor Architectures.
_960251
650 2 4 _aSignal, Speech and Image Processing .
_931566
700 1 _aJeddi, Zahra.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_960252
700 1 _aAmini, Esmaeil.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_960253
700 1 _aBayoumi, Magdy.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_960254
710 2 _aSpringerLink (Online service)
_960255
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319475448
776 0 8 _iPrinted edition:
_z9783319475462
776 0 8 _iPrinted edition:
_z9783319837642
830 0 _aAnalog Circuits and Signal Processing,
_x2197-1854
_960256
856 4 0 _uhttps://doi.org/10.1007/978-3-319-47545-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80508
_d80508