ESD.290 | Spring 2005 | Graduate

Special Topics in Supply Chain Management

Conference Videos

manfred_aig_rfid.pdf

Description:

This resource contains information on motivation for standardized security on a tag, security requirements for RFID tags, limitations due to technology, hash vs. symmetric encryption, results so far (developed at IAIK) and future research topics.

Resource Type:
Videos
pdf
405 kB
manfred_aig_rfid.pdf

Course Info

Learning Resource Types
Workshop Videos
Lecture Notes
Activity Assignments
Written Assignments