Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.
Dr. Ahmed Khattab is currently an Assistant Professor in the Electronics and Electrical Communications Engineering Department at Cairo University. He received his Ph.D. in Computer Engineering from the Center for Advanced Computer Studies (CACS) at the University of Louisiana at Lafayette in 2011. He received a Master of Electrical Engineering degree from Rice University in 2009. He also received M.Sc. and B.Sc. (honors) degrees in Electrical Engineering from Cairo University, Cairo, Egypt, in 2004 and 2002, respectively. He is an Assistant Professor in the Electronics and Electrical Communications Engineering Department at Cairo University. He is also adjunct Assistant Professor in the American University in Cairo (AUC). He has authored/co-authored 2 books, a patent application and over 35 journal and conference publications. He serves as a reviewer in many IEEE transactions, journals and conferences, and is a member of the technical committee of severalprestigious conferences such as IEEE Globecom, IEEE ICCCN, and IEEE WF-IoT. He won the best student paper award from the IEEE Computer Society at the University of Louisiana at Lafayette chapter twice in 2010 and in 2011, and was a finalist in the best paper award contest in the IEEE ICCCN 2008 conference. He also received Texas Instruments Distinguished Endowed student fellowship in 2005.
Dr. Zahra Jeddi is a System Validation Engineer at Intel Corporation.
Dr. Esmaeil Amini is a Senior Software Engineer at Yahoo Corporation.
Dr. Magdy A. Bayoumi is Director of The Center for Advanced Computer Studies (CACS), and Department Head of the Computer Science Department at the University of Louisiana at Lafayette (UL Lafayette). He is also the Z.L. Loflin Eminent Scholar Endowed Chair Professor in Computer Science. Dr. Bayoumi has been a faculty member in CACS since 1985. He received B.Sc. and M.Sc. degrees inElectrical Engineering from Cairo University, Egypt; M.Sc. degree in Computer Engineering from Washington University, St. Louis; and Ph.D. degree in Electrical Engineering from the University of Windsor, Canada. Dr. Bayoumi is the recipient of the 2009 IEEE Circuits and Systems Meritorious Service Award. Dr. Bayoumi is the recipient of the IEEE Circuits and Systems Society 2003 Education Award, and he is an IEEE Fellow. He was on the governor's commission for developing a comprehensive energy policy for the State of Louisiana. He represented the CAS Society on the IEEE National Committee on Engineering R&D policy, IEEE National Committee on Communication and Information Policy, and IEEE National Committee on Energy Policy. He is also active in the "Renewable & Green Energy" and "Globalization: Technology, Economic and Culture" fields.
Part I. RFID Security Preliminaries.- 1. Introduction to RFID.- 2. RFID Security Threats and Basic Solutions.- 3. Cryptography in RFID Systems.- Part II. Lightweight RFID Redundant Bit Security.- 4. RBS Cryptosystem.- 5. RBS Security Analysis.- 6. RBS Performance Evaluation.- 7. RBS RFID Security and The Internet of Things.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.