Radio Frequency Identification. Security and Privacy Issues

8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers

  • Jaap-Henk Hoepman
  • Ingrid Verbauwhede
Conference proceedings RFIDSec 2012

DOI: 10.1007/978-3-642-36140-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7739)

Table of contents (12 papers)

  1. Front Matter
  2. On the Security of Tan et al. Serverless RFID Authentication and Search Protocols
    Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio Cesar Hernandez-Castro
    Pages 1-19
  3. Improved Anonymity for Key-Trees
    Thijs Veugen, Michael Beye
    Pages 31-47
  4. Hidden Bits Approach for Authentication in RFID Systems
    Marek Klonowski, Krzysztof Majcher, Wojciech Macyna, Filip Zagórski
    Pages 48-58
  5. Designated Attribute-Based Proofs for RFID Applications
    Gergely Alpár, Lejla Batina, Wouter Lueks
    Pages 59-75
  6. T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags
    Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
    Pages 76-95
  7. Weakening ePassports through Bad Implementations
    Luigi Sportiello
    Pages 123-136
  8. Never Trust a Bunny
    Daniel J. Bernstein, Tanja Lange
    Pages 137-148
  9. DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification
    Daniel E. Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne P. Burleson, Kevin Fu
    Pages 165-179
  10. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012.
The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.

Keywords

RFID systems authentication protocol cryptography privacy preserving payments symmetric-key algorithms

Editors and affiliations

  • Jaap-Henk Hoepman
    • 1
  • Ingrid Verbauwhede
    • 2
  1. 1.Institute for Computing and Information Sciences, Department of Digital SecurityRadboud University NijmegenNijmegenThe Netherlands
  2. 2.Electrical Engineering DepartmentK.U. Leuven, ESAT - SCD/COSICHeverleeBelgium

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-36139-5
  • Online ISBN 978-3-642-36140-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349