000 -LEADER |
fixed length control field |
05987nam a2200721 i 4500 |
001 - CONTROL NUMBER |
control field |
6813192 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200413152913.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140113s2014 caua foab 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781627053266 |
Qualifying information |
ebook |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781627053259 |
Qualifying information |
paperback |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.2200/S00550ED1V01Y201311SPT007 |
Source of number or code |
doi |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl00403034 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)868157000 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK6570.I34 |
Item number |
L57 2014 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.245 |
Edition number |
23 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
|
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
MoCl |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Li, Yingjiu., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
RFID security and privacy / |
Statement of responsibility, etc. |
Yingjiu Li, Robert H. Deng, Elisa Bertino. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : |
Name of producer, publisher, distributor, manufacturer |
Morgan & Claypool, |
Date of production, publication, distribution, manufacture, or copyright notice |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 PDF (xiii, 143 pages) : |
Other physical details |
illustrations. |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
electronic |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Synthesis lectures on information security, privacy, & trust, |
International Standard Serial Number |
1945-9750 ; |
Volume/sequential designation |
# 7 |
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat Reader. |
500 ## - GENERAL NOTE |
General note |
Part of: Synthesis digital library of engineering and computer science. |
500 ## - GENERAL NOTE |
General note |
Series from website. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 127-139). |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction -- 1.1 RFID technology -- 1.2 RFID technology at the physical level -- 1.3 RFID technology at the network level -- 1.4 RFID security and privacy -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
2. RFID security at the physical level -- 2.1 Tag/reader/mutual authentication -- 2.1.1 Public key solutions -- 2.1.2 Symmetric key solutions -- 2.1.3 Hash-based solutions -- 2.1.4 Lightweight solutions -- 2.1.5 Radio frequency distance bounding -- 2.2 Key distribution -- 2.2.1 Secret sharing across space and time -- 2.2.2 Resilient secret sharing -- 2.3 Path authentication -- 2.3.1 TRACKER -- 2.3.2 Other path authentication solutions -- 2.4 Clone tag detection -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
3. RFID privacy at the physical level -- 3.1 Indistinguishability-based privacy and unpredictability-based privacy -- 3.1.1 Preliminaries -- 3.1.2 Indistinguishability-based privacy -- 3.1.3 Unpredictability-based privacy -- 3.1.4 Improvements of Unp-privacy model -- 3.1.5 Relation between Unp-privacy and Ind-privacy -- 3.1.6 Minimal requirement on RFID tags for Unp-privacy -- 3.2 Zero-knowledge-based privacy -- 3.2.1 Preliminaries -- 3.2.2 Model of RFID system -- 3.2.3 ZK-privacy -- 3.2.4 Discussions -- 3.2.5 Comparisons with Ind-privacy and Unp-privacy -- 3.2.6 An RFID mutual authentication protocol with ZK-privacy -- 3.3 Vaudenay's privacy framework -- 3.4 Universal composibility-based privacy -- 3.5 Privacy in path authentication -- 3.5.1 Multi-reader system and adversary model -- 3.5.2 Tag unlinkability and step unlinkability -- 3.5.3 Path privacy -- 3.5.4 Path authentication schemes with privacy -- 3.6 Privacy in ownership transfer -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
4. RFID security at the network level -- 4.1 Background -- 4.2 Access control policies in EPCglobal network -- 4.3 Access control enforcement in EPCDS -- 4.4 Access control enforcement in EPCIS -- 4.5 Defence against false event injection in EPCDS -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
5. RFID privacy at the network level -- 5.1 Anonymity of tag id in EPCDS -- 5.2 Anti-tracing of tag ID in EPCDS -- 5.2.1 Unauthorized tracing mitigation -- 5.2.2 Access control and key management -- 5.2.3 Compatibility and performance issues -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
6. Summary and future directions -- Bibliography -- Authors' biographies. |
506 1# - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Abstract freely available; full-text restricted to subscribers or individual document purchasers. |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Compendex |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
INSPEC |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google scholar |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google book search |
520 3# - SUMMARY, ETC. |
Summary, etc. |
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Also available in print. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF title page (viewed on January 13, 2014). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Radio frequency identification systems |
General subdivision |
Security measures. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
RFID technology |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
RFID system |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
RFID security |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
RFID privacy |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
authentication |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
access control |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
EPCglobal Network |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Deng, Robert H., |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Bertino, Elisa., |
Relator term |
author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781627053259 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis digital library of engineering and computer science. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis lectures on information security, privacy, and trust ; |
Volume/sequential designation |
# 7. |
International Standard Serial Number |
1945-9750 |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to resource |
Uniform Resource Identifier |
http://ieeexplore.ieee.org/servlet/opac?bknumber=6813192 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to full text |
Uniform Resource Identifier |
http://dx.doi.org/10.2200/S00550ED1V01Y201311SPT007 |