Eintrag weiter verarbeiten

Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers

Gespeichert in:

Personen und Körperschaften: Ors Yalcin, Siddika Berna (VerfasserIn)
Titel: Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers/ edited by Siddika Berna Ors Yalcin
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2010
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 6370
Schlagwörter:
Buchausg. u.d.T.: Radio frequency identification: security and privacy issues, Berlin : Springer, 2010, X, 269 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 06817cam a22013452 4500
001 0-1650330618
003 DE-627
005 20240122105241.0
007 cr uuu---uuuuu
008 101102s2010 gw |||||o 00| ||eng c
020 |a 9783642168222  |9 978-3-642-16822-2 
024 7 |a 10.1007/978-3-642-16822-2  |2 doi 
035 |a (DE-627)1650330618 
035 |a (DE-576)332858693 
035 |a (DE-599)BSZ332858693 
035 |a (OCoLC)682101421 
035 |a (OCoLC)731498726 
035 |a (DE-He213)978-3-642-16822-2 
035 |a (EBP)040530752 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE 
050 0 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
084 |a SS 4800  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a 54.38  |2 bkl 
084 |a 54.62  |2 bkl 
100 1 |a Ors Yalcin, Siddika Berna  |4 aut 
245 1 0 |a Radio Frequency Identification: Security and Privacy Issues  |b 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers  |c edited by Siddika Berna Ors Yalcin 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010 
300 |a Online-Ressource (X, 271p. 72 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 6370 
490 0 |a SpringerLink  |a Bücher 
520 |a Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Software engineering 
650 0 |a Computer software 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 0 |a Computer networks . 
650 0 |a Algorithms. 
650 0 |a Electronic data processing 
650 0 |a Computers, Special purpose. 
655 7 |a Konferenzschrift  |y 2010  |z Istanbul  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4509863-3  |0 (DE-627)247285846  |0 (DE-576)213179423  |a RFID  |2 gnd 
689 0 1 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 2 |D s  |0 (DE-588)4123980-5  |0 (DE-627)105751111  |0 (DE-576)209564288  |a Privatsphäre  |2 gnd 
689 0 3 |D s  |0 (DE-588)4330656-1  |0 (DE-627)133218872  |0 (DE-576)211314684  |a Authentifikation  |2 gnd 
689 0 4 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 0 |5 DE-101 
776 1 |z 9783642168215 
776 0 8 |i Buchausg. u.d.T.  |t Radio frequency identification: security and privacy issues  |d Berlin : Springer, 2010  |h X, 269 S.  |w (DE-627)636266974  |w (DE-576)333567153  |z 3642168213  |z 9783642168215 
830 0 |a Lecture notes in computer science  |v 6370  |9 6370  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-16822-2  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC  |b 2010 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SCS  |b 2010 
912 |a ZDB-2-SXCS  |b 2010 
912 |a ZDB-2-SEB  |b 2010 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
936 b k |a 54.62  |j Datenstrukturen  |q SEPA  |0 (DE-627)106403265 
951 |a BO 
950 |a Schutz der Privatsphäre 
950 |a Persönlichkeitsrecht 
950 |a 私人领域 
950 |a 私隐 
950 |a 私人領域 
950 |a 私隱 
950 |a Сфера личной жизни 
950 |a Datensicherheit 
950 |a Sicherheit 
950 |a Datenverarbeitung 
950 |a Informationssicherheit 
950 |a Computersicherheit 
950 |a Softwareschutz 
950 |a Надёжность сохранения данных 
950 |a Authentizitätsprüfung 
950 |a Authentikation 
950 |a Authentifizierung 
950 |a Authentication 
950 |a Authentisierung 
950 |a Zugriffskontrolle 
950 |a Radio frequency identification 
950 |a Radiofrequenzidentifikation 
950 |a Automatische Identifikation 
950 |a Funktechnik 
950 |a Warenkennzeichnung 
950 |a Cryptoanalysis 
950 |a Angriff 
950 |a Attacke 
950 |a Kryptoanalytische Attacke 
950 |a Kryptoanalytischer Angriff 
950 |a Cryptanalysis 
950 |a Kryptologie 
950 |a Dechiffrierung 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-16822-2  |9 DE-14 
852 |a DE-14  |z 2011-07-20T14:57:56Z  |x epn:3336562198 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-16822-2  |9 DE-15 
852 |a DE-15  |z 2011-05-16T16:32:16Z  |x epn:3336562252 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-16822-2  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |z 2011-01-26T14:21:18Z  |x epn:3336562368 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-16822-2  |9 DE-520 
852 |a DE-520  |z 2010-11-02T09:08:15Z  |x epn:3336562414 
980 |a 1650330618  |b 0  |k 1650330618  |o 332858693 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Radio+Frequency+Identification%3A+Security+and+Privacy+Issues%3A+6th+International+Workshop%2C+RFIDSec+2010%2C+Istanbul%2C+Turkey%2C+June+8-9%2C+2010%2C+Revised+Selected+Papers&rft.date=2010&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Radio+Frequency+Identification%3A+Security+and+Privacy+Issues%3A+6th+International+Workshop%2C+RFIDSec+2010%2C+Istanbul%2C+Turkey%2C+June+8-9%2C+2010%2C+Revised+Selected+Papers&rft.series=Lecture+notes+in+computer+science%2C+6370&rft.au=Ors+Yalcin%2C+Siddika+Berna&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642168221
SOLR
_version_ 1789358366835867648
access_facet Electronic Resources
author Ors Yalcin, Siddika Berna
author_facet Ors Yalcin, Siddika Berna
author_role aut
author_sort Ors Yalcin, Siddika Berna
author_variant y s b o ysb ysbo
callnumber-first T - Technology
callnumber-label TK5105
callnumber-raw TK5105.5-5105.9
callnumber-search TK5105.5-5105.9
callnumber-sort TK 45105.5 45105.9
callnumber-subject TK - Electrical and Nuclear Engineering
collection ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
contents Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications.
ctrlnum (DE-627)1650330618, (DE-576)332858693, (DE-599)BSZ332858693, (OCoLC)682101421, (OCoLC)731498726, (DE-He213)978-3-642-16822-2, (EBP)040530752
de15_date 2011-05-16T16:32:16Z
doi_str_mv 10.1007/978-3-642-16822-2
era_facet 2010
facet_912a ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse
finc_class_facet Informatik, Technik
finc_id_str 0001438007
fincclass_txtF_mv science-computerscience
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2010 Istanbul (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Istanbul
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 6370
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1650330618
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2010
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2010
institution DE-14, DE-Zi4, DE-520, DE-15
is_hierarchy_id 0-1650330618
is_hierarchy_title Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
isbn 9783642168222
isbn_isn_mv 9783642168215, 3642168213
issn_isn_mv 1611-3349
kxp_id_str 1650330618
language English
last_indexed 2024-01-28T18:05:16.955Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse
marc024a_ct_mv 10.1007/978-3-642-16822-2
match_str orsyalcin2010radiofrequencyidentificationsecurityandprivacyissues6thinternationalworkshoprfidsec2010istanbulturkeyjune892010revisedselectedpapers
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)6370
oclc_num 682101421, 731498726
physical Online-Ressource (X, 271p. 72 illus, digital)
publishDate 2010
publishDateSort 2010
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 332858693
recordtype marcfinc
rsn_id_str_mv (DE-15)2462139
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 6370
series2 Lecture Notes in Computer Science ; 6370, SpringerLink ; Bücher
source_id 0
spelling Ors Yalcin, Siddika Berna aut, Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers edited by Siddika Berna Ors Yalcin, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (X, 271p. 72 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6370, SpringerLink Bücher, Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications., Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., Konferenzschrift 2010 Istanbul (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4509863-3 (DE-627)247285846 (DE-576)213179423 RFID gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4330656-1 (DE-627)133218872 (DE-576)211314684 Authentifikation gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, DE-101, 9783642168215, Buchausg. u.d.T. Radio frequency identification: security and privacy issues Berlin : Springer, 2010 X, 269 S. (DE-627)636266974 (DE-576)333567153 3642168213 9783642168215, Lecture notes in computer science 6370 6370 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-16822-2 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-16822-2 DE-14, DE-14 2011-07-20T14:57:56Z epn:3336562198, http://dx.doi.org/10.1007/978-3-642-16822-2 DE-15, DE-15 2011-05-16T16:32:16Z epn:3336562252, http://dx.doi.org/10.1007/978-3-642-16822-2 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:21:18Z epn:3336562368, http://dx.doi.org/10.1007/978-3-642-16822-2 DE-520, DE-520 2010-11-02T09:08:15Z epn:3336562414
spellingShingle Ors Yalcin, Siddika Berna, Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers, Lecture notes in computer science, 6370, Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications., Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., Konferenzschrift 2010 Istanbul, RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse
swb_id_str 332858693
title Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
title_auth Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
title_full Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers edited by Siddika Berna Ors Yalcin
title_fullStr Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers edited by Siddika Berna Ors Yalcin
title_full_unstemmed Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers edited by Siddika Berna Ors Yalcin
title_in_hierarchy 6370. Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers (2010)
title_short Radio Frequency Identification: Security and Privacy Issues
title_sort radio frequency identification security and privacy issues 6th international workshop rfidsec 2010 istanbul turkey june 8 9 2010 revised selected papers
title_sub 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
title_unstemmed Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
topic Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., Konferenzschrift 2010 Istanbul, RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse
topic_facet Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., Konferenzschrift, RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse
url https://doi.org/10.1007/978-3-642-16822-2, http://dx.doi.org/10.1007/978-3-642-16822-2