Abstract
The following contribution introduces an approach to avert removal-reapplication attacks of RIFD transponders. This is achieved by tightly coupling security tags with individual objects using object specific data.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Nochta, Z., Staake, T., and Fleisch, E. 2006. Product specific security features based on RFID technology. In Proceedings, International Symposium on Applications and the Internet Workshops – SAINTW ”06: 72–75
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Staake, T., Nochta, Z., Fleisch, E. (2008). Product Specific Security Based on RFID Technology. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-71641-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71640-2
Online ISBN: 978-3-540-71641-9
eBook Packages: Computer ScienceComputer Science (R0)