This resource is no longer available

Cover Image

This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.

Contents include:

- Why RFID technology is functionally appealing

- Does RFID security and privacy matter?

- Can you verify the security and privacy of a protocol?

Vendor:
TechTarget ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
Mar 12, 2015
Format:
PDF
Type:
Essential Guide

This resource is no longer available.