From Passive to Covert Security at Low Cost.
Ivan DamgårdMartin GeislerJesper Buus NielsenPublished in: TCC (2010)
Keyphrases
- low cost
- information flow
- intrusion detection
- security issues
- information security
- access control
- information assurance
- rfid tags
- low power
- security systems
- security threats
- data acquisition
- security requirements
- authentication protocol
- security mechanisms
- network security
- security management
- data security
- computer security
- functional requirements
- key management
- security analysis
- encryption scheme
- smart card
- user authentication
- security problems
- statistical databases
- security policies
- high security
- security vulnerabilities
- data mining