Networked RFID Systems and Lightweight Cryptography
Raising Barriers to Product Counterfeiting
Cole, Peter H., Ranasinghe, Damith C. (Eds.)
2008, VIII, 355 p.
Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Presents the use of lightweight cryptography to address security and privacy related issues
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the extent of their success, the various barriers that may be brought against their actions, and the effectiveness of those barriers. The new field of lightweight cryptography is described in the context of using RFID systems in the fight against counterfeit products, its cost effectiveness is examined and feasible approaches to its deployment are described. Research problems and likely avenues for solutions are also presented to guide a global effort in anti-counterfeiting.
Content Level »Professional/practitioner
Keywords »CompTIA RFID+ - Elliptic Curve Cryptography - Lightweight cryptography - Product authentication - Radio frequency identification systems - authentication - cryptography - information system - near field communication - privacy - radio-frequency identification (RFID