RF identification and security technique for highly-secure UWB information systems.
Mohamed S. KheirHeinz KreftReinhard H. KnöchelPublished in: PIMRC (2013)
Keyphrases
- information systems
- information security
- security issues
- security requirements
- security level
- security measures
- security mechanisms
- information assurance
- security protocols
- key management
- security management
- electronic voting
- cryptographic protocols
- access control
- security properties
- sensitive data
- data security
- stream cipher
- security analysis
- data encryption
- user authentication
- security model
- information technology
- key exchange protocol
- smart card
- key exchange
- rfid systems
- secure communication
- encryption scheme
- security patterns
- integrity verification
- digital signature scheme
- authentication protocol
- security policies
- authentication mechanism
- identity management
- security architecture
- public key encryption
- mobile agent system
- security services
- diffie hellman
- authentication scheme
- intrusion detection
- key agreement protocol
- key distribution
- radio frequency
- key establishment
- secure routing
- unauthorized access
- communication systems
- network security
- relevance feedback
- wireless networks
- public key cryptosystem
- key agreement
- secret key
- resource constrained
- rfid technology
- digital rights management
- provably secure
- radio frequency identification