Technology Evaluation: The Security Implications of VeriChip Cloning.
John D. HalamkaAri JuelsAdam StubblefieldJonathan WesthuesPublished in: J. Am. Medical Informatics Assoc. (2006)
Keyphrases
- case study
- data encryption
- intrusion detection
- key technologies
- information processing systems
- information security
- sensor technology
- security architecture
- neural network
- mobile devices
- cost effective
- network security
- evaluation method
- security policies
- network management
- security issues
- computer security
- digital rights management