Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

RFID security and privacy / (Record no. 562051)

000 -LEADER
fixed length control field 05987nam a2200721 i 4500
001 - CONTROL NUMBER
control field 6813192
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152913.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140113s2014 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627053266
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781627053259
Qualifying information paperback
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00550ED1V01Y201311SPT007
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00403034
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)868157000
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK6570.I34
Item number L57 2014
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.245
Edition number 23
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR)
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) MoCl
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Li, Yingjiu.,
Relator term author.
245 10 - TITLE STATEMENT
Title RFID security and privacy /
Statement of responsibility, etc. Yingjiu Li, Robert H. Deng, Elisa Bertino.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xiii, 143 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on information security, privacy, & trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 7
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
500 ## - GENERAL NOTE
General note Series from website.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 127-139).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 1.1 RFID technology -- 1.2 RFID technology at the physical level -- 1.3 RFID technology at the network level -- 1.4 RFID security and privacy --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. RFID security at the physical level -- 2.1 Tag/reader/mutual authentication -- 2.1.1 Public key solutions -- 2.1.2 Symmetric key solutions -- 2.1.3 Hash-based solutions -- 2.1.4 Lightweight solutions -- 2.1.5 Radio frequency distance bounding -- 2.2 Key distribution -- 2.2.1 Secret sharing across space and time -- 2.2.2 Resilient secret sharing -- 2.3 Path authentication -- 2.3.1 TRACKER -- 2.3.2 Other path authentication solutions -- 2.4 Clone tag detection --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. RFID privacy at the physical level -- 3.1 Indistinguishability-based privacy and unpredictability-based privacy -- 3.1.1 Preliminaries -- 3.1.2 Indistinguishability-based privacy -- 3.1.3 Unpredictability-based privacy -- 3.1.4 Improvements of Unp-privacy model -- 3.1.5 Relation between Unp-privacy and Ind-privacy -- 3.1.6 Minimal requirement on RFID tags for Unp-privacy -- 3.2 Zero-knowledge-based privacy -- 3.2.1 Preliminaries -- 3.2.2 Model of RFID system -- 3.2.3 ZK-privacy -- 3.2.4 Discussions -- 3.2.5 Comparisons with Ind-privacy and Unp-privacy -- 3.2.6 An RFID mutual authentication protocol with ZK-privacy -- 3.3 Vaudenay's privacy framework -- 3.4 Universal composibility-based privacy -- 3.5 Privacy in path authentication -- 3.5.1 Multi-reader system and adversary model -- 3.5.2 Tag unlinkability and step unlinkability -- 3.5.3 Path privacy -- 3.5.4 Path authentication schemes with privacy -- 3.6 Privacy in ownership transfer --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. RFID security at the network level -- 4.1 Background -- 4.2 Access control policies in EPCglobal network -- 4.3 Access control enforcement in EPCDS -- 4.4 Access control enforcement in EPCIS -- 4.5 Defence against false event injection in EPCDS --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. RFID privacy at the network level -- 5.1 Anonymity of tag id in EPCDS -- 5.2 Anti-tracing of tag ID in EPCDS -- 5.2.1 Unauthorized tracing mitigation -- 5.2.2 Access control and key management -- 5.2.3 Compatibility and performance issues --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. Summary and future directions -- Bibliography -- Authors' biographies.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on January 13, 2014).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Radio frequency identification systems
General subdivision Security measures.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term RFID technology
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term RFID system
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term RFID security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term RFID privacy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term authentication
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term access control
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term EPCglobal Network
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Deng, Robert H.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bertino, Elisa.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781627053259
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on information security, privacy, and trust ;
Volume/sequential designation # 7.
International Standard Serial Number 1945-9750
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=6813192
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to full text
Uniform Resource Identifier http://dx.doi.org/10.2200/S00550ED1V01Y201311SPT007
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE551 2020-04-13 2020-04-13 E books

Powered by Koha