CW+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
March 2015

Building trust in the security of RFID systems

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.

Table Of Contents

 

  • Why RFID technology is functionally appealing
  • Does RFID security and privacy matter?
  • Can you verify the security and privacy of a protocol?

More CW+ Content

View All