Academic literature on the topic 'Computer networks Computer security. Data protection. Information technology Radio frequency identification systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Computer security. Data protection. Information technology Radio frequency identification systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks Computer security. Data protection. Information technology Radio frequency identification systems"
Dong, Qingkuan, Mengmeng Chen, Lulu Li, and Kai Fan. "Cloud-based radio frequency identification authentication protocol with location privacy protection." International Journal of Distributed Sensor Networks 14, no. 1 (January 2018): 155014771875496. http://dx.doi.org/10.1177/1550147718754969.
Full textZhang, Shiyong, and Gongliang Chen. "Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems." International Journal of Distributed Sensor Networks 13, no. 2 (February 2017): 155014771769417. http://dx.doi.org/10.1177/1550147717694171.
Full textZhang, Zhen, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, and Jin Wang. "An Ensemble Learning Method for Wireless Multimedia Device Identification." Security and Communication Networks 2018 (October 15, 2018): 1–9. http://dx.doi.org/10.1155/2018/5264526.
Full textWu, Zhen-Yu. "An radio-frequency identification security authentication mechanism for Internet of things applications." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771986222. http://dx.doi.org/10.1177/1550147719862223.
Full textGódor, Gyozo, and Sándor Imre. "Simple Lightweight Authentication Protocol." International Journal of Business Data Communications and Networking 6, no. 3 (July 2010): 66–94. http://dx.doi.org/10.4018/jbdcn.2010070104.
Full textLiu, Yu, Xiaolei Liu, and Yanmin Zhao. "Security Cryptanalysis of NUX for the Internet of Things." Security and Communication Networks 2019 (June 12, 2019): 1–12. http://dx.doi.org/10.1155/2019/2062697.
Full textHajny, Jan, Petr Dzurenda, and Lukas Malina. "Multidevice Authentication with Strong Privacy Protection." Wireless Communications and Mobile Computing 2018 (July 29, 2018): 1–12. http://dx.doi.org/10.1155/2018/3295148.
Full textXu, He, Xin Chen, Feng Zhu, and Peng Li. "A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems." Wireless Communications and Mobile Computing 2021 (July 23, 2021): 1–14. http://dx.doi.org/10.1155/2021/8844178.
Full textShabbir, Aysha, Maryam Shabbir, Muhammad Rizwan, and Fahad Ahmad. "Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard." Security and Communication Networks 2019 (December 18, 2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.
Full textDiamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls." Information & Computer Security 28, no. 4 (June 8, 2020): 645–62. http://dx.doi.org/10.1108/ics-01-2020-0004.
Full textDissertations / Theses on the topic "Computer networks Computer security. Data protection. Information technology Radio frequency identification systems"
Chapman, Adam Scott Burmester Mike. "A dynamic, perimeter based, community-centric access control system." Diss., 2006. http://etd.lib.fsu.edu/theses/available/04072006-213501.
Full textAdvisor: Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 15, 2006). Document formatted into pages; contains viii, 48 pages. Includes bibliographical references.
Books on the topic "Computer networks Computer security. Data protection. Information technology Radio frequency identification systems"
Yalcin, Siddika Berna Ors. Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
Find full textHoepman, Jaap-Henk. Radio Frequency Identification. Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textVerbauwhede, Ingrid, and Jaap-Henk Hoepman. Radio Frequency Identification : Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Springer, 2013.
Find full textBook chapters on the topic "Computer networks Computer security. Data protection. Information technology Radio frequency identification systems"
Loebecke, Claudia. "RFID in the Retail Supply Chain." In Information Security and Ethics, 1923–30. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch130.
Full textKaupins, Gundars. "Mobile Computing and Commerce Legal Implications." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 938–43. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch127.
Full text