Staake, ThorstenThorstenStaakeNochta, ZoltanZoltanNochtaFleisch, ElgarElgarFleisch2019-09-192014-04-222008978-3-540-71641-9https://fis.uni-bamberg.de/handle/uniba/3198The following contribution introduces an approach to avert removal-reapplication attacks of RIFD transponders. This is achieved by tightly coupling security tags with individual objects using object specific data.engProduct Specific Security Based on RFID Technologybookpart10.1007/978-3-540-71641-9_13http://link.springer.com/chapter/10.1007/978-3-540-71641-9_13