|
|
|
|
LEADER |
06817cam a22013452 4500 |
001 |
0-1650330618 |
003 |
DE-627 |
005 |
20240122105241.0 |
007 |
cr uuu---uuuuu |
008 |
101102s2010 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642168222
|9 978-3-642-16822-2
|
024 |
7 |
|
|a 10.1007/978-3-642-16822-2
|2 doi
|
035 |
|
|
|a (DE-627)1650330618
|
035 |
|
|
|a (DE-576)332858693
|
035 |
|
|
|a (DE-599)BSZ332858693
|
035 |
|
|
|a (OCoLC)682101421
|
035 |
|
|
|a (OCoLC)731498726
|
035 |
|
|
|a (DE-He213)978-3-642-16822-2
|
035 |
|
|
|a (EBP)040530752
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|
050 |
|
0 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.62
|2 bkl
|
100 |
1 |
|
|a Ors Yalcin, Siddika Berna
|4 aut
|
245 |
1 |
0 |
|a Radio Frequency Identification: Security and Privacy Issues
|b 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
|c edited by Siddika Berna Ors Yalcin
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2010
|
300 |
|
|
|a Online-Ressource (X, 271p. 72 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 6370
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
520 |
|
|
|a Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Software engineering
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Computers, Special purpose.
|
655 |
|
7 |
|a Konferenzschrift
|y 2010
|z Istanbul
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4509863-3
|0 (DE-627)247285846
|0 (DE-576)213179423
|a RFID
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
0 |
3 |
|D s
|0 (DE-588)4330656-1
|0 (DE-627)133218872
|0 (DE-576)211314684
|a Authentifikation
|2 gnd
|
689 |
0 |
4 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
776 |
1 |
|
|z 9783642168215
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Radio frequency identification: security and privacy issues
|d Berlin : Springer, 2010
|h X, 269 S.
|w (DE-627)636266974
|w (DE-576)333567153
|z 3642168213
|z 9783642168215
|
830 |
|
0 |
|a Lecture notes in computer science
|v 6370
|9 6370
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-16822-2
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SCS
|b 2010
|
912 |
|
|
|a ZDB-2-SXCS
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|b 2010
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
951 |
|
|
|a BO
|
950 |
|
|
|a Schutz der Privatsphäre
|
950 |
|
|
|a Persönlichkeitsrecht
|
950 |
|
|
|a 私人领域
|
950 |
|
|
|a 私隐
|
950 |
|
|
|a 私人領域
|
950 |
|
|
|a 私隱
|
950 |
|
|
|a Сфера личной жизни
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Authentizitätsprüfung
|
950 |
|
|
|a Authentikation
|
950 |
|
|
|a Authentifizierung
|
950 |
|
|
|a Authentication
|
950 |
|
|
|a Authentisierung
|
950 |
|
|
|a Zugriffskontrolle
|
950 |
|
|
|a Radio frequency identification
|
950 |
|
|
|a Radiofrequenzidentifikation
|
950 |
|
|
|a Automatische Identifikation
|
950 |
|
|
|a Funktechnik
|
950 |
|
|
|a Warenkennzeichnung
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-16822-2
|9 DE-14
|
852 |
|
|
|a DE-14
|z 2011-07-20T14:57:56Z
|x epn:3336562198
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-16822-2
|9 DE-15
|
852 |
|
|
|a DE-15
|z 2011-05-16T16:32:16Z
|x epn:3336562252
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-16822-2
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|z 2011-01-26T14:21:18Z
|x epn:3336562368
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-16822-2
|9 DE-520
|
852 |
|
|
|a DE-520
|z 2010-11-02T09:08:15Z
|x epn:3336562414
|
980 |
|
|
|a 1650330618
|b 0
|k 1650330618
|o 332858693
|
SOLR
_version_ |
1789358366835867648 |
access_facet |
Electronic Resources |
author |
Ors Yalcin, Siddika Berna |
author_facet |
Ors Yalcin, Siddika Berna |
author_role |
aut |
author_sort |
Ors Yalcin, Siddika Berna |
author_variant |
y s b o ysb ysbo |
callnumber-first |
T - Technology |
callnumber-label |
TK5105 |
callnumber-raw |
TK5105.5-5105.9 |
callnumber-search |
TK5105.5-5105.9 |
callnumber-sort |
TK 45105.5 45105.9 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
collection |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. |
ctrlnum |
(DE-627)1650330618, (DE-576)332858693, (DE-599)BSZ332858693, (OCoLC)682101421, (OCoLC)731498726, (DE-He213)978-3-642-16822-2, (EBP)040530752 |
de15_date |
2011-05-16T16:32:16Z |
doi_str_mv |
10.1007/978-3-642-16822-2 |
era_facet |
2010 |
facet_912a |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse |
finc_class_facet |
Informatik, Technik |
finc_id_str |
0001438007 |
fincclass_txtF_mv |
science-computerscience |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2010 Istanbul (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Istanbul |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
6370 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1650330618 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2010 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2010 |
institution |
DE-14, DE-Zi4, DE-520, DE-15 |
is_hierarchy_id |
0-1650330618 |
is_hierarchy_title |
Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers |
isbn |
9783642168222 |
isbn_isn_mv |
9783642168215, 3642168213 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1650330618 |
language |
English |
last_indexed |
2024-01-28T18:05:16.955Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse |
marc024a_ct_mv |
10.1007/978-3-642-16822-2 |
match_str |
orsyalcin2010radiofrequencyidentificationsecurityandprivacyissues6thinternationalworkshoprfidsec2010istanbulturkeyjune892010revisedselectedpapers |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)6370 |
oclc_num |
682101421, 731498726 |
physical |
Online-Ressource (X, 271p. 72 illus, digital) |
publishDate |
2010 |
publishDateSort |
2010 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
332858693 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)2462139 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 6370 |
series2 |
Lecture Notes in Computer Science ; 6370, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Ors Yalcin, Siddika Berna aut, Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers edited by Siddika Berna Ors Yalcin, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (X, 271p. 72 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6370, SpringerLink Bücher, Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications., Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., Konferenzschrift 2010 Istanbul (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4509863-3 (DE-627)247285846 (DE-576)213179423 RFID gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4330656-1 (DE-627)133218872 (DE-576)211314684 Authentifikation gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, DE-101, 9783642168215, Buchausg. u.d.T. Radio frequency identification: security and privacy issues Berlin : Springer, 2010 X, 269 S. (DE-627)636266974 (DE-576)333567153 3642168213 9783642168215, Lecture notes in computer science 6370 6370 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-16822-2 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-16822-2 DE-14, DE-14 2011-07-20T14:57:56Z epn:3336562198, http://dx.doi.org/10.1007/978-3-642-16822-2 DE-15, DE-15 2011-05-16T16:32:16Z epn:3336562252, http://dx.doi.org/10.1007/978-3-642-16822-2 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:21:18Z epn:3336562368, http://dx.doi.org/10.1007/978-3-642-16822-2 DE-520, DE-520 2010-11-02T09:08:15Z epn:3336562414 |
spellingShingle |
Ors Yalcin, Siddika Berna, Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers, Lecture notes in computer science, 6370, Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol -- Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones -- Strong Authentication and Strong Integrity (SASI) Is Not That Strong -- Invited Talk 2 -- Privacy Models for RFID Schemes -- Session 2 -- On the Claimed Privacy of EC-RAC III -- EC-RAC: Enriching a Capacious RFID Attack Collection -- Anonymous RFID Authentication Using Trusted Computing Technologies -- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly -- Invited Talk 3 -- Hardware Intrinsic Security -- Session 3 -- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting -- Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols -- Anonymous Authentication for RFID Systems -- Leakage-Resilient RFID Authentication with Forward-Privacy -- Session 4 -- An ECDSA Processor for RFID Authentication -- Towards a Practical Solution to the RFID Desynchronization Problem -- Session 5 -- Optimal Security Limits of RFID Distance Bounding Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications., Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., Konferenzschrift 2010 Istanbul, RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse |
swb_id_str |
332858693 |
title |
Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers |
title_auth |
Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers |
title_full |
Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers edited by Siddika Berna Ors Yalcin |
title_fullStr |
Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers edited by Siddika Berna Ors Yalcin |
title_full_unstemmed |
Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers edited by Siddika Berna Ors Yalcin |
title_in_hierarchy |
6370. Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers (2010) |
title_short |
Radio Frequency Identification: Security and Privacy Issues |
title_sort |
radio frequency identification security and privacy issues 6th international workshop rfidsec 2010 istanbul turkey june 8 9 2010 revised selected papers |
title_sub |
6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers |
title_unstemmed |
Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers |
topic |
Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., Konferenzschrift 2010 Istanbul, RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse |
topic_facet |
Computer science, Computer Communication Networks, Software engineering, Computer software, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Electronic data processing, Computers, Special purpose., Konferenzschrift, RFID, Datensicherung, Privatsphäre, Authentifikation, Kryptoanalyse |
url |
https://doi.org/10.1007/978-3-642-16822-2, http://dx.doi.org/10.1007/978-3-642-16822-2 |