14
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Pervasive Computing 

      Securing RFID Systems by Detecting Tag Cloning

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references19

          • Record: found
          • Abstract: not found
          • Article: not found

          RFID security and privacy: a research survey

          A. Juels (2006)
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              A Scalable and Provably Secure Hash-Based RFID Protocol

                Bookmark

                Author and book information

                Book Chapter
                2009
                : 291-308
                10.1007/978-3-642-01516-8_20
                ac47355a-a699-4cdf-9f55-4ca8f23284d9
                History

                Comments

                Comment on this book

                Book chapters

                Similar content4,188

                Cited by3