Amanote Research

Amanote Research

    RegisterSign In

The Outer Limits of RFID Security

Lecture Notes in Computer Science - Germany
doi 10.1007/11894063_18
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2006

Authors
Ari Juels
Publisher

Springer Berlin Heidelberg


Related search

The Security of EPC Gen2 Compliant RFID Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Enclosing Critique: The Limits of Ontological Security

International Political Sociology
SociologyPolitical Science
2015English

Advanced RFID Systems, Security, and Applications

2013English

Security and Privacy in RFID Applications

2009English

The Limits of Epistemic Communities: EU Security Agencies

Politics and Governance
SociologyPolitical SciencePublic Administration
2015English

Asset Management Security System Using RFID Technology

International Journal of Engineering and Technology(UAE)
ArchitectureHardwareEngineeringChemical EngineeringBiotechnologyEnvironmental EngineeringComputer Science
2018English

Security and Reliability of RFID Technology in Supply Chain Management

2010English

Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6"

IEEE Communications Letters
Electronic EngineeringSimulationComputer Science ApplicationsElectricalModeling
2013English

An Analysis of RFID (Radio Frequency Identification) Data Transmission Security

2018English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy