RFID Authentication, Efficient Proactive Information Security within Computational Security
Shlomi DolevMarina KopeetskyAdi ShamirPublished in: CoRR (2009)
Keyphrases
- information security
- security requirements
- security issues
- user authentication
- information assurance
- countermeasures
- network security
- intrusion detection
- information systems
- security level
- computer security
- smart card
- information security management
- security mechanisms
- cyber defense
- security analysis
- low cost
- sensitive data
- risk assessment
- authentication scheme
- critical infrastructure
- rfid tags
- risk analysis
- data security
- e government
- data protection
- database
- privacy concerns
- real world
- data mining
- security threats
- iso iec
- authentication protocol
- smart grid