Atjaunināt sīkdatņu piekrišanu

RFID Security and Privacy: Concepts, Protocols, and Architectures 1st ed. Softcover of orig. ed. 2008 [Mīkstie vāki]

  • Formāts: Paperback / softback, 269 pages, height x width: 235x155 mm, weight: 454 g, XI, 269 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Electrical Engineering 17
  • Izdošanas datums: 28-Oct-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642097928
  • ISBN-13: 9783642097928
  • Mīkstie vāki
  • Cena: 136,16 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 160,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 269 pages, height x width: 235x155 mm, weight: 454 g, XI, 269 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Electrical Engineering 17
  • Izdošanas datums: 28-Oct-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642097928
  • ISBN-13: 9783642097928
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: There must exist better solutions. I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller Ø , whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security,privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my Ø supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own.
Motivation and Vision.- Fundamentals.- Analysis and Modeling.- Securing RFID Systems.- Pseudonymization Infrastructures.- Extending the RFID System Model.- Current Research.