Reference Hub9
Indices4
Advanced Security and Privacy for RFID Technologies

Advanced Security and Privacy for RFID Technologies

Copyright: © 2013 |Pages: 342
ISBN13: 9781466636859|ISBN10: 1466636858|EISBN13: 9781466636866
DOI: 10.4018/978-1-4666-3685-9
Cite Book Cite Book

MLA

Miri, Ali, editor. Advanced Security and Privacy for RFID Technologies. IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3685-9

APA

Miri, A. (Ed.). (2013). Advanced Security and Privacy for RFID Technologies. IGI Global. https://doi.org/10.4018/978-1-4666-3685-9

Chicago

Miri, Ali, ed. Advanced Security and Privacy for RFID Technologies. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3685-9

Export Reference

Mendeley
Favorite Full-Book Download

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information.

Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book’s expansive coverage on the topic.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Background and Preliminaries
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Attacks  (pages 23-23)
Attacks
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Existing Solutions  (pages 69-69)
Existing Solutions
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Privacy  (pages 102-102)
Privacy
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.