This is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. It is the first book to comprehensively cover RFID security issues and solutions. Part 1 deals with RFID fundamentals. Part 2 addresses RFID security protocols and techniques. Finally, the book discusses hardware implementation of security algorithms and protocols dedicated to RFID platforms and chips.There has been significant previous work in the area of technology for point-and- click user interfaces and the usability of ... Tags are very inexpensive and they do not need their own source of power as they can be powered by RFID readers.
|Author||:||Paris Kitsos, Yan Zhang|
|Publisher||:||Springer Science & Business Media - 2008-09-08|