Product specific security based on RFID technology

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The following contribution introduces an approach to avert removal-reapplication attacks of RIFD transponders. This is achieved by tightly coupling security tags with individual objects using object specific data. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Staake, T., Nochta, Z., & Fleisch, E. (2008). Product specific security based on RFID technology. In Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting: First Edition (pp. 249–252). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free