This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA, December 2006. The 22 revised full papers and 17 revised short papers cover security protocols, applied cryptography, access control, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, and security implementations.An ID that shows up in the wrong location, or does not exist in the database could indicate potential problems. However ... Since an RFID tag can be read from a distance without line of sight, an adversary can steal large numbers of RFID data and then place the real data onto counterfeit RFID tags. This way ... The work focuses on techniques for aggregating and indexing RFID data and query processing.
|Title||:||Information and Communications Security|
|Author||:||Peng Ning, Ninghui Li|
|Publisher||:||Springer - 2006-11-17|