Editors:
High quality selected papers
Unique visibility
State of the art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6370)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): RFIDSec: International Workshop on Radio Frequency Identification: Security and Privacy Issues
Conference proceedings info: RFIDSec 2010.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (20 papers)
-
Front Matter
-
Invited Talk 1
-
Session 1
-
Invited Talk 2
-
Invited Talk 3
Keywords
- CompTIA RFID+
- activity recognition
- anonymity
- attacks
- authentication
- barcodes
- compositionality
- context recognition
- countermeasure
- cryptography
- digital signatures
- distance bounding protocol
- distance fraud
- privacy
- radio-frequency identification (RFID)
- algorithm analysis and problem complexity
Editors and Affiliations
-
Faculty of Electrical and Electronics Engineering, Department of Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey
Siddika Berna Ors Yalcin
Bibliographic Information
Book Title: Radio Frequency Identification: Security and Privacy Issues
Book Subtitle: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
Editors: Siddika Berna Ors Yalcin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-16822-2
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-16821-5Published: 04 November 2010
eBook ISBN: 978-3-642-16822-2Published: 31 October 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 271
Number of Illustrations: 72 b/w illustrations
Topics: Computer Communication Networks, Cryptology, Data and Information Security, Algorithms, IT Operations, Special Purpose and Application-Based Systems