Hilfe Warenkorb Konto Anmelden
 
 
   Schnellsuche   
     zur Expertensuche                      
RFID Security and Privacy - Concepts, Protocols, and Architectures
  Großes Bild
 
RFID Security and Privacy - Concepts, Protocols, and Architectures
von: Dirk Henrici
Springer-Verlag, 2008
ISBN: 9783540790761
275 Seiten, Download: 5339 KB
 
Format:  PDF
geeignet für: Apple iPad, Android Tablet PC's Online-Lesen PC, MAC, Laptop

Typ: B (paralleler Zugriff)

 

 
eBook anfordern
Inhaltsverzeichnis

  Preface 6  
  Contents 8  
  Outline 11  
  1 Motivation and Vision 13  
  2 Fundamentals 17  
     2.1 Radio-Frequency Identification 17  
     2.2 Security 33  
     2.3 Privacy 37  
     2.4 Cryptographic Primitives 55  
     2.5 Summary 65  
  3 Analysis and Modeling 67  
     3.1 Motivating Examples 68  
     3.2 Threats 70  
     3.3 Goals 74  
     3.4 Challenges 75  
     3.5 Attacker Capabilities 77  
     3.6 Attacks on RFID Systems 83  
     3.7 Current Situation 85  
     3.8 Assessment of RFID Security and Privacy 89  
     3.9 Summary 90  
  4 Securing RFID Systems 91  
     4.1 Data Management 92  
     4.2 Discussion of Security and Privacy Goals 93  
     4.3 Overview of Functionality Regarding Tags 96  
     4.4 Implementation Considerations 97  
     4.5 Discussion of Basic Functionality 100  
     4.6 Additional Building Blocks 130  
     4.7 Evaluation Criteria 134  
     4.8 Hash-based ID Variation 138  
     4.9 Summary 153  
  5 Pseudonymization Infrastructures 155  
     5.1 Motivation 155  
     5.2 Basic Idea for Addressing the Problem 156  
     5.3 Pseudonymization: Introduction and Related Work 157  
     5.4 Definition of Requirements and Common Concepts 161  
     5.5 Attack Targets and Attacker Capabilities 163  
     5.6 Approach Based on Asymmetric Encryption 165  
     5.7 Basic Approach Based on Hash Functions 170  
     5.8 Advanced Approach Based on Hash Functions 177  
     5.9 Hash Collisions and Pseudonym Shortening in Hash-Based Approaches 186  
     5.10 Summary and Research Directions 188  
  6 Extending the RFID System Model 190  
     6.1 Classic RFID Model 191  
     6.2 Untrusted Reading Entities 192  
     6.3 Tag Bearer as Additional Entity 196  
     6.4 Personal Manager 199  
     6.5 Assembling the Building Blocks 203  
     6.6 Summary 205  
  7 Current Research 207  
     7.1 Partial Solutions 207  
     7.2 ID-Zone Architecture 221  
     7.3 Summary 253  
  List of Figures 255  
  List of Tables 258  
  References 259  
  Index 271  


nach oben


  Mehr zum Inhalt
Kapitelübersicht
Kurzinformation
Inhaltsverzeichnis
Leseprobe
Blick ins Buch
Fragen zu eBooks?

  Navigation
Belletristik / Romane
Computer
Geschichte
Kultur
Medizin / Gesundheit
Philosophie / Religion
Politik
Psychologie / Pädagogik
Ratgeber
Recht
Reise / Hobbys
Sexualität / Erotik
Technik / Wissen
Wirtschaft

  Info
Hier gelangen Sie wieder zum Online-Auftritt Ihrer Bibliothek
© 2008-2024 ciando GmbH | Impressum | Kontakt | F.A.Q. | Datenschutz