000 | 03341nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-031-02340-8 | ||
003 | DE-He213 | ||
005 | 20240730163908.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2014 sz | s |||| 0|eng d | ||
020 |
_a9783031023408 _9978-3-031-02340-8 |
||
024 | 7 |
_a10.1007/978-3-031-02340-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aLi, Yingjiu. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981078 |
|
245 | 1 | 0 |
_aRFID Security and Privacy _h[electronic resource] / _cby Yingjiu Li, Robert Deng, Elisa Bertino. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXIII, 140 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aPreface -- Acknowledgments -- Introduction -- RFID Security at the Physical Level -- RFID Privacy at the Physical Level -- RFID Security at the Network Level -- RFID Privacy at the Network Level -- Summary and Future Directions -- Bibliography -- Authors' Biographies . | |
520 | _aAs a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aDeng, Robert. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981079 |
|
700 | 1 |
_aBertino, Elisa. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981080 |
|
710 | 2 |
_aSpringerLink (Online service) _981081 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012129 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034688 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _981082 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02340-8 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85101 _d85101 |