On Identifying Proper Security Mechanisms.
Jakub BreierLadislav HudecPublished in: ICT-EurAsia (2013)
Keyphrases
- security mechanisms
- resource constrained
- security issues
- smart card
- access control
- security systems
- security problems
- operating system
- security requirements
- cryptographic algorithms
- digital signature
- security measures
- security services
- payment systems
- rfid tags
- security protocols
- embedded systems
- sensor networks
- wireless sensor networks
- data mining