Now showing items 1-3 of 3
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
(Wiley Online Library, 2014-06-03)
This paper examines Vaudenay’s privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary ...
The Professionalisation of Information Security: Perspectives of UK Practitioners
In response to the increased “cyber” threats to business, the UK and US Governments are taking steps to develop the training and professional identity of information security practitioners. The ambition of the UK Government ...
A new security and privacy framework for RFID in cloud computing
RFID is a leading technology that has been rapidly deployed in several daily life applications that require strong security and privacy mechanisms. However, RFID systems commonly have limited computational capacity and ...