2017
DOI: 10.1007/978-3-319-72395-2_55
|View full text |Cite
|
Sign up to set email alerts
|

Security Solution of RFID Card Through Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The performance analysis of the authentication RFID framework is assessed via some important criteria: ensuring reading data security, information leakage probability, complexity, establishing cost, user authentication, and execution time. Table presents the obtained results according to these criteria.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The performance analysis of the authentication RFID framework is assessed via some important criteria: ensuring reading data security, information leakage probability, complexity, establishing cost, user authentication, and execution time. Table presents the obtained results according to these criteria.…”
Section: Resultsmentioning
confidence: 99%
“…As it is previously mentioned that the proposed framework presents encouraging results. A comparison with the existing methods based on Reference is also provided in Table . We notice that the proposed approach gives better performances than cryptography‐based approaches.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The international accounting bodies emphasize the necessity to develop the appropriate skills for protecting the data and assuring confidentiality, integrity, and availability of the information by using efficient controls [1]. By adopting these technologies in the accounting field, the risk of sensitive data exposure increases and this regard the practitioners need to understand the necessity of preventing security incidents, even more, now as the most significant amount of vulnerable data is produced by the accounting and financial departments [26].…”
Section: The Benefit Of Technologies On Information Securitymentioning
confidence: 99%
“…The enterprise security risk management (ESRM) is a progressive practice which, when combined with security convergence, these can help organizations such as my corporation to set up comprehensive SCRM processes. Aspects of enterprise security risk management can include Supply chain risk management; Physical asset protection; Human resource security; Information security [26]; Communications security and Continuity management. The Organizational behaviors that limit security; Not long ago, we experience computers with a powered-down modem, and an office with a locked front door would sufficiently protect our network and data information.…”
Section: Risk Mitigation Action Pointsmentioning
confidence: 99%