1 / 275
文档名称:

RFID Security and Privacy - Concepts, Protocols and Architectures - D. Henrici (Springer, 2008) WW.pdf

格式:pdf   页数:275
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

RFID Security and Privacy - Concepts, Protocols and Architectures - D. Henrici (Springer, 2008) WW.pdf

上传人:bolee65 2014/7/3 文件大小:0 KB

下载得到文件列表

RFID Security and Privacy - Concepts, Protocols and Architectures - D. Henrici (Springer, 2008) WW.pdf

文档介绍

文档介绍:Lecture Notes Electrical Engineering
Volume 17
Dirk Henrici
RFID Security and Privacy
Concepts, Protocols, and Architectures
123
Dr. Dirk Henrici
University of Kaiserslautern
67653 Kaiserslautern
Germany
******@-
ISBN: 978-3-540-79075-4 e-ISBN: 978-3-540-79076-1
Library of Congress Control Number: 2008924615
c 2008 Springer-Verlag Berlin Heidelberg
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting,
reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication
or parts thereof is permitted only under the provisions of the German Copyright Law of September 9,
1965, in its current version, and permission for use must always be obtained from Springer. Violations are
liable to prosecution under the German Copyright Law.
The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,
even in the absence of a specific statement, that such names are exempt from the relevant protective laws
and regulations and therefore free for general use.
Cover design: eStudio Calamar .
Printed on acid-free paper
987654321
Dedicated to all dear people
panying me on the journey of life
Preface
In the beginning of 2003, I found a short article about the privacy implications of
RFID technology in a newspaper. It raised my interest, and after reading some early
research papers on the topic, I thought: “There must exist better solutions.” I con-
cerned myself with the topic in my spare time. After having developed my first so-
lutions, I asked my supervisor, Prof. Dr. Paul Muller,¨ whether I could write a paper
about my results. As the topic did not fit into any running project or at least the
overall research directions of his group, he could have answered no. But instead, he
encourage