Bit-oriented generators for Wireless Sensor Networks and low cost RFID transponders
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Secure RFID authentication with efficient key-lookup
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Cryptanalysis of the knapsack generator
FSE'11 Proceedings of the 18th international conference on Fast software encryption
RFID enabled traceability networks: a survey
Distributed and Parallel Databases
Extending an RFID security and privacy model by considering forward untraceability
STM'10 Proceedings of the 6th international conference on Security and trust management
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Lightweight authentication for RFID used in VANETs
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Critical Evaluation of RFID Security Protocols
International Journal of Information Security and Privacy
Subtle kinks in distance-bounding: an analysis of prominent protocols
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Pushing the limits of SHA-3 hardware implementations to fit on RFID
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID Labs around the globe. The collection of works and the organisation of the book assume very little knowledge on the part of the reader on Networked RFID systems as the material provided in the introduction familiarises the reader with concepts, underlying principles and vulnerabilities of modern RFID systems. The collection of works presented on highlighting the counterfeiting problem and problems with existing low cost RFID technology is an important guide to practitioners, professionals and graduates in the area of RFID systems application, implementation and integration.