Showing 1 - 10 of 570
Persistent link: https://www.econbiz.de/10012888269
ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader … stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be …
Persistent link: https://www.econbiz.de/10009483982
system security and resources. The author's mechanism should be design in such way, the Confidentiality, Integrity …
Persistent link: https://www.econbiz.de/10012043937
Standards and Technology. It is still a powerful data integrity and authentication tool that provides better protection than … data security techniques were developed to ensure privacy, integrity and authenticity. One of the techniques developed was … to fulfill authentication with a message authentication code (MAC) that was defined by the National Institute of …
Persistent link: https://www.econbiz.de/10012045717
Persistent link: https://www.econbiz.de/10012416431
Persistent link: https://www.econbiz.de/10012271208
Persistent link: https://www.econbiz.de/10013547707
Purpose – Global navigation satellite systems (GNSS) were designed to determine the exact location of objects on land, water and air for military purposes. With the opening of the satellite signal for civilian use, the technology created business opportunities for various applications. Today,...
Persistent link: https://www.econbiz.de/10014743729
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegation is particularly useful in federated environments where multiple systems, with their own security autonomy, are connected under one common federation. Although many delegation schemes have been...
Persistent link: https://www.econbiz.de/10009437840
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that protects private data through the enforcement of licenses provided by consumers. Prior to supplying data, data owners are...
Persistent link: https://www.econbiz.de/10009438034