Normal view MARC view ISBD view

RFID Security and Privacy [electronic resource] / by Yingjiu Li, Robert Deng, Elisa Bertino.

By: Li, Yingjiu [author.].
Contributor(s): Deng, Robert [author.] | Bertino, Elisa [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Synthesis Lectures on Information Security, Privacy, and Trust: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Edition: 1st ed. 2014.Description: XIII, 140 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031023408.Subject(s): Data protection | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Preface -- Acknowledgments -- Introduction -- RFID Security at the Physical Level -- RFID Privacy at the Physical Level -- RFID Security at the Network Level -- RFID Privacy at the Network Level -- Summary and Future Directions -- Bibliography -- Authors' Biographies .
In: Springer Nature eBookSummary: As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.
    average rating: 0.0 (0 votes)
No physical items for this record

Preface -- Acknowledgments -- Introduction -- RFID Security at the Physical Level -- RFID Privacy at the Physical Level -- RFID Security at the Network Level -- RFID Privacy at the Network Level -- Summary and Future Directions -- Bibliography -- Authors' Biographies .

As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.

There are no comments for this item.

Log in to your account to post a comment.