-
RFID security [Elektronski vir] : techniques, protocols and system-on-chip designRFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and ... security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chipsType of material - e-bookPublication and manufacture - New York : Springer, ©2008Language - englishISBN - 978-0-387-76481-8; 0-387-76481-X; 0-387-76480-1; 978-0-387-76480-1; 1-281-77380-8; 978-1-281-77380-7COBISS.SI-ID - 1541222879
Link(s):
SpringerLink e-books 2008-2012Celotno besedilo dostopno za uporabnike SpringerLink slovenskega konzorcija neprofitnih institucij
Full text accessible to the users of SpringerLink Slovenian Consortium of Non-Profit Institutions
DOI
Other authors
Kitsos, Paris, 1952- |
Zhang, Yan, 1977-
Topics
Radio frequency identification systems |
Security measures |
Systems on a chip |
Design and construction |
TECHNOLOGY & ENGINEERING |
Radio |
TECHNOLOGY & ENGINEERING |
Mobile & Wireless Communications |
Ingénierie |
RFID |
Datensicherung |
Circuits and Systems |
Signal, Image and Speech Processing |
Communications Engineering, Networks |
Data Encryption |
Electronics and Microelectronics, Instrumentation |
Radio frequency identification systems |
Security measures |
Electronic books |
Aufsatzsammlung
Shelf entry
Permalink
- URL:
Impact factor
Access to the JCR database is permitted only to users from Slovenia. Your current IP address is not on the list of IP addresses with access permission, and authentication with the relevant AAI accout is required.
Year | Impact factor | Edition | Category | Classification | ||||
---|---|---|---|---|---|---|---|---|
JCR | SNIP | JCR | SNIP | JCR | SNIP | JCR | SNIP |
Select the library membership card:
DRS, in which the journal is indexed
Database name | Field | Year |
---|
Links to authors' personal bibliographies | Links to information on researchers in the SICRIS system |
---|
Select pickup location:
Material pickup by post
Notification
Subject headings in COBISS General List of Subject Headings
Select pickup location
Pickup location | Material status | Reservation |
---|
Please wait a moment.