An electronic copy of book is available for Library Members Sign in to view the book
This edited volume explores the use of networked RFID (Radio-Frequency Identification) systems combined with lightweight cryptographic techniques to prevent product counterfeiting. It covers design, security, and practical deployment issues for RFID-based supply chain systems, presenting both theoretical foundations and real-world engineering considerations. The book examines threat models, cryptographic protocols suitable for resource‑constrained devices, system architectures, and the challenges involved in balancing security, performance, and cost — making it a useful reference for researchers and practitioners in RFID, embedded security, and supply‑chain protection.
Sub Title:
Edition:
Volume:
Publisher: Springer-Verlag Berlin Heidelberg
Publishing Year: 2008
ISBN: 978-3-540-71640-2
Pages: 355