2008

Networked RFID Systems and Lightweight Cryptography

Raising Barriers to Product Counterfeiting

Editors:

ISBN: 978-3-540-71640-2 (Print) 978-3-540-71641-9 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages I-VIII

  2. Introduction from the editors

    1. No Access

      Book Chapter

      Pages 1-30

      Introduction from the editors

  3. Anti-counterfeiting and RFID

    1. Front Matter

      Pages 31-31

    2. No Access

      Book Chapter

      Pages 33-43

      Anti-Counterfeiting and Supply Chain Security

    3. No Access

      Book Chapter

      Pages 45-58

      Networked RFID Systems

    4. No Access

      Book Chapter

      Pages 59-78

      EPC Network Architecture

    5. No Access

      Book Chapter

      Pages 79-98

      A Security Primer

  4. Security and Privacy Current Status

    1. Front Matter

      Pages 99-99

    2. No Access

      Book Chapter

      Pages 101-145

      Addressing Insecurities and Violations of Privacy

    3. No Access

      Book Chapter

      Pages 147-155

      RFID Tag Vulnerabilities in RFID Systems

    4. No Access

      Book Chapter

      Pages 157-167

      An Evaluation Framework

    5. No Access

      Book Chapter

      Pages 169-187

      From Identification to Authentication – A Review of RFID Product Authentication Techniques

  5. Network Based Solutions

    1. Front Matter

      Pages 189-189

    2. No Access

      Book Chapter

      Pages 191-210

      EPC System for a Safe & Secure Supply Chain and How it is Applied

    3. No Access

      Book Chapter

      Pages 211-222

      The Potential of RFID and NFC in Anti-Counterfeiting

    4. No Access

      Book Chapter

      Pages 223-246

      Improving the Safety and Security of the Pharmaceutical Supply Chain

  6. Cryptographic Solutions

    1. Front Matter

      Pages 247-247

    2. No Access

      Book Chapter

      Pages 249-252

      Product Specific Security Based on RFID Technology

    3. No Access

      Book Chapter

      Pages 253-267

      Strengthening the Security of Machine-Readable Documents

    4. No Access

      Book Chapter

      Pages 269-277

      Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning

    5. No Access

      Book Chapter

      Pages 279-287

      A Random Number Generator for Application in RFID Tags

    6. No Access

      Book Chapter

      Pages 289-309

      A Low Cost Solution to Cloning and Authentication Based on a Lightweight Primitive

    7. No Access

      Book Chapter

      Pages 311-346

      Lightweight Cryptography for Low Cost RFID

  7. Back Matter

    Pages 347-355