The following contribution introduces an approach to avert removal-reapplication attacks of RIFD transponders. This is achieved by tightly coupling security tags with individual objects using object specific data. © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Staake, T., Nochta, Z., & Fleisch, E. (2008). Product specific security based on RFID technology. In Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting: First Edition (pp. 249–252). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_13
Mendeley helps you to discover research relevant for your work.