Login / Signup
Security implications in RFID and authentication processing framework.
John Ayoade
Published in:
Comput. Secur. (2006)
Keyphrases
</>
data processing
access control
security requirements
supply chain
information security
security policies
security mechanisms
security analysis
user authentication
authentication scheme