Sciweavers

6 search results - page 2 / 2
» The Security of EPC Gen2 Compliant RFID Protocols
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis