Go to Page # Page of 17
loading

NIST Guidelines for Securing Radio Frequency Identification

 Tom Karygiannis, National Institute of Standards and Technology, U.S. Department of Commerce
  10th-Nov-2008
Description: System-Level vs. Chip-Level Security Guidelines for Securing Radio Frequency Identification Systems RFID Applications and Requirements Risks Skimming Rogue Reader Eavesdropping Passive Capture Tracking –Persistent IDs Cloning Making Unauthorized Tags Physical Tampering Extracting Keying Material
Views: 437
Domain: Electronics
Category: Mobile
weSRCH App on Apple
Contents:
NIST Guidelines for Securing Radio
Frequency Identification
National Institute of Standards and Technology
U.S. Department of Commerce
Tom Karygiannis
Email: karygiannis@nist.gov

Washington, DC
September 23, 2008

0

System-Level Security vs. Chip-Level Security
Example: Marathon vs. Supply Chain Security
No one size fits all solution.
Different risks, different business
case, different counterm ... See more
...
13 November, 2008
...
13 November, 2008