
RFID Security
Description
Key Features
* Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information
* Little competition in a market desperate for information
Readership
Table of Contents
- Chapter 1: What is RFID?
Chapter 2: RFID Use Cases
Chapter 3: RFID Processes
Chapter 4: Threat Modeling for RFID Systems
Chapter 5: Target Identification
Chapter 6: RFID Processes
Chapter 7: Tag Encoding Attacks
Chapter 8: Tag Application Attacks
Chapter 9: Attacking the Air Interface
Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory
Chapter 12: The Four Disciplines
Chapter 13: Vulnerability Management
Chapter 14: Identity Management in RFID
Chapter 15: Trust Management
Chapter 16: Threat Management
Product details
- No. of pages: 448
- Language: English
- Copyright: © Syngress 2005
- Published: June 23, 2005
- Imprint: Syngress
- eBook ISBN: 9780080489650
About the Authors
Frank Thornton
In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."