Login / Signup

Security implications in RFID and authentication processing framework.

John Ayoade
Published in: Comput. Secur. (2006)
Keyphrases
  • data processing
  • access control
  • security requirements
  • supply chain
  • information security
  • security policies
  • security mechanisms
  • security analysis
  • user authentication
  • authentication scheme