RFID security /
By: Thornton, Frank
Title By: Haines, Brad
Material type:![](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 621.384 TH RF (Browse shelf) | Available | T0027147 |
, Shelving location: Main Collection Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
621.384 SE FU Fundamentals of cognitive radio | 621.384 SH WI Wireless positioning : | 621.384 SM WI Wireless networks : | 621.384 TH RF RFID security / | 621.384 YO MI MIMO-OFDM wireless communications with MATLAB | 621.38411 HU SU A survey of the principles and practice of wave guides | 621.38412 BO MI Millimeter-wave low noise amplifiers |
Discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. This work includes coverage of topics such as: security breaches for monetary gain; how to protect the supply chain; and how to protect personal privacy.
Chapter 1: What is RFID? Chapter 2: RFID Use Cases Chapter 3: RFID Processes Chapter 4: Threat Modeling for RFID Systems Chapter 5: Target Identification Chapter 6: RFID Processes Chapter 7: Tag Encoding Attacks Chapter 8: Tag Application Attacks Chapter 9: Attacking the Air Interface Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory Chapter 12: The Four Disciplines Chapter 13: Vulnerability Management Chapter 14: Identity Management in RFID Chapter 15: Trust Management Chapter 16: Threat Management.