Abstract
The following contribution introduces an approach to avert removal-reapplication attacks of RIFD transponders. This is achieved by tightly coupling security tags with individual objects using object specific data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nochta, Z., Staake, T., and Fleisch, E. 2006. Product specific security features based on RFID technology. In Proceedings, International Symposium on Applications and the Internet Workshops – SAINTW ”06: 72–75
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Staake, T., Nochta, Z., Fleisch, E. (2008). Product Specific Security Based on RFID Technology. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-71641-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71640-2
Online ISBN: 978-3-540-71641-9
eBook Packages: Computer ScienceComputer Science (R0)