Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on the fundamentals, security challenges, and solutions in RFID, WSNs, and integrated RFID & WSNs. Complete with several detailed case studies, this essential reference includes practical examples for intuitive understanding and necessary information to…mehr
Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on the fundamentals, security challenges, and solutions in RFID, WSNs, and integrated RFID & WSNs. Complete with several detailed case studies, this essential reference includes practical examples for intuitive understanding and necessary information to assist professionals, engineers, and researchers involved in the security of RFID and WSNs.
Security in RFID.Multi-Tag RFID Systems.Attacking RFID Systems. RFID Relay Attacks: System Analysis,Modeling, and Implementation. Physical Privacy and Security in RFID Systems. Authentication Protocols in RFID Systems. Lightweight Cryptography for Low-Cost RFID Tags. Distance-Bounding Protocols for RFID. Secure Proximity Identification for RFID. Public Key in RFIDs: Appeal for Asymmetry. Scalable RFID Privacy Protecting Schemes. A Secure RFID Access Control Mechanism. Threat Modeling in EPC-Based Information Sharing Networks. RFID-Based Secure DVD Content Distribution. Security in Wireless Sensor Networks. A Survey on Security in Wireless Sensor Networks. Intrusion Detection in Wireless Sensor Networks. Key Establishment in Wireless Sensor Networks. Malicious Node Detection in Wireless Sensor Networks. Jamming in Wireless Sensor Networks. Concealed Data Aggregation for Wireless Sensor Networks. Message Authentication in Surveillance Networks. A Broadcasting Authentication Protocol with DoS and Fault Tolerance For Wireless Ad Hoc Networks. Security in Integerated RFID and WSN. Threats and Vulnerabilities of RFID and Beyond. Finite Field Arithmetic for RFID and Sensor Networks. Designing SecureWireless Embedded Systems. Index.
Security in RFID.Multi-Tag RFID Systems.Attacking RFID Systems. RFID Relay Attacks: System Analysis,Modeling, and Implementation. Physical Privacy and Security in RFID Systems. Authentication Protocols in RFID Systems. Lightweight Cryptography for Low-Cost RFID Tags. Distance-Bounding Protocols for RFID. Secure Proximity Identification for RFID. Public Key in RFIDs: Appeal for Asymmetry. Scalable RFID Privacy Protecting Schemes. A Secure RFID Access Control Mechanism. Threat Modeling in EPC-Based Information Sharing Networks. RFID-Based Secure DVD Content Distribution. Security in Wireless Sensor Networks. A Survey on Security in Wireless Sensor Networks. Intrusion Detection in Wireless Sensor Networks. Key Establishment in Wireless Sensor Networks. Malicious Node Detection in Wireless Sensor Networks. Jamming in Wireless Sensor Networks. Concealed Data Aggregation for Wireless Sensor Networks. Message Authentication in Surveillance Networks. A Broadcasting Authentication Protocol with DoS and Fault Tolerance For Wireless Ad Hoc Networks. Security in Integerated RFID and WSN. Threats and Vulnerabilities of RFID and Beyond. Finite Field Arithmetic for RFID and Sensor Networks. Designing SecureWireless Embedded Systems. Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309