RFID Authentication Efficient Proactive Information Security within Computational Security.
Shlomi DolevMarina KopeetskyAdi ShamirPublished in: Theory Comput. Syst. (2011)
Keyphrases
- information security
- security requirements
- user authentication
- security issues
- countermeasures
- information assurance
- smart card
- network security
- intrusion detection
- information systems
- information security management
- security mechanisms
- security level
- computer security
- cyber defense
- smart grid
- sensitive data
- security analysis
- rfid tags
- e government
- mutual authentication
- risk analysis
- iso iec
- low cost
- lightweight
- data security
- authentication protocol
- authentication scheme
- security threats
- decision making
- information technology
- cyber attacks
- critical infrastructure
- cyber security