Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation.
Zahra JeddiAhmed K. F. KhattabEsmaeil AminiMagdy A. BayoumiPublished in: J. Circuits Syst. Comput. (2017)
Keyphrases
- information security
- network security
- intrusion detection
- security requirements
- security issues
- information assurance
- high security
- security policies
- statistical databases
- access control
- random number generator
- security mechanisms
- information systems
- security problems
- security protocols
- security analysis
- real time
- security vulnerabilities
- security level
- security systems
- intrusion detection system
- computer security
- functional requirements
- low cost
- lightweight