Login / Signup

Security Analysis and Implementation Leveraging Globally Networked RFIDs.

Namje ParkSeungjoo KimDongho WonHowon Kim
Published in: PWC (2006)
Keyphrases
  • security analysis
  • security model
  • smart card
  • security requirements
  • public key
  • image encryption
  • encryption scheme
  • authentication protocol
  • real time
  • security properties
  • high security