Access your Pro+ Content below.
Building trust in the security of RFID systems
Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.
Table Of Contents
- Why RFID technology is functionally appealing
- Does RFID security and privacy matter?
- Can you verify the security and privacy of a protocol?