↓ Skip to main content

Radio Frequency Identification: Security and Privacy Issues

Overview of attention for book
Cover of 'Radio Frequency Identification: Security and Privacy Issues'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 The Physical Basis of RFID Security
  3. Altmetric Badge
    Chapter 2 Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model
  4. Altmetric Badge
    Chapter 3 Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
  5. Altmetric Badge
    Chapter 4 Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
  6. Altmetric Badge
    Chapter 5 Strong Authentication and Strong Integrity (SASI) Is Not That Strong
  7. Altmetric Badge
    Chapter 6 Privacy Models for RFID Schemes
  8. Altmetric Badge
    Chapter 7 On the Claimed Privacy of EC-RAC III
  9. Altmetric Badge
    Chapter 8 EC-RAC: Enriching a Capacious RFID Attack Collection
  10. Altmetric Badge
    Chapter 9 Anonymous RFID Authentication Using Trusted Computing Technologies
  11. Altmetric Badge
    Chapter 10 Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
  12. Altmetric Badge
    Chapter 11 Hardware Intrinsic Security
  13. Altmetric Badge
    Chapter 12 Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting
  14. Altmetric Badge
    Chapter 13 Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols
  15. Altmetric Badge
    Chapter 14 Anonymous Authentication for RFID Systems
  16. Altmetric Badge
    Chapter 15 Leakage-Resilient RFID Authentication with Forward-Privacy
  17. Altmetric Badge
    Chapter 16 An ECDSA Processor for RFID Authentication
  18. Altmetric Badge
    Chapter 17 Towards a Practical Solution to the RFID Desynchronization Problem
  19. Altmetric Badge
    Chapter 18 Optimal Security Limits of RFID Distance Bounding Protocols
  20. Altmetric Badge
    Chapter 19 The Poulidor Distance-Bounding Protocol
  21. Altmetric Badge
    Chapter 20 A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications
Attention for Chapter 4: Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
6 Dimensions

Readers on

mendeley
116 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
Chapter number 4
Book title
Radio Frequency Identification: Security and Privacy Issues
Published by
Springer Berlin Heidelberg, June 2010
DOI 10.1007/978-3-642-16822-2_4
Book ISBNs
978-3-64-216821-5, 978-3-64-216822-2
Authors

Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 116 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Germany 1 <1%
Switzerland 1 <1%
Turkey 1 <1%
Indonesia 1 <1%
United Kingdom 1 <1%
Taiwan 1 <1%
China 1 <1%
Unknown 109 94%

Demographic breakdown

Readers by professional status Count As %
Student > Master 32 28%
Student > Ph. D. Student 30 26%
Student > Bachelor 16 14%
Researcher 8 7%
Student > Postgraduate 4 3%
Other 15 13%
Unknown 11 9%
Readers by discipline Count As %
Computer Science 84 72%
Engineering 10 9%
Business, Management and Accounting 4 3%
Medicine and Dentistry 3 3%
Mathematics 1 <1%
Other 4 3%
Unknown 10 9%