메뉴 건너뛰기




Volumn 317, Issue 5842, 2007, Pages 1178-1179

Engineering: Privacy by design

Author keywords

[No Author keywords available]

Indexed keywords

COST-BENEFIT ANALYSIS; DATA INTERPRETATION; DIGITAL IMAGE; INFORMATION TECHNOLOGY; SCIENCE AND TECHNOLOGY; SOFTWARE;

EID: 63049102323     PISSN: 00368075     EISSN: 10959203     Source Type: Journal    
DOI: 10.1126/science.1143464     Document Type: Short Survey
Times cited : (15)

References (14)
  • 1
    • 63049140056 scopus 로고    scopus 로고
    • www.oracle.com/corporate/press/2007-feb/oracledata integrator.html
  • 6
    • 63049118187 scopus 로고    scopus 로고
    • www.verispan.com/index.php
  • 11
    • 63049103370 scopus 로고    scopus 로고
    • www.gnn.gov.uk/environment/fullDetail.asp?Release ID= 264567&NewsAreaID=2&NavigatedFromDepartm ent=False
  • 12
    • 63049138651 scopus 로고    scopus 로고
    • T. Karygiannis et al., Guidelines for Securing Radio Frequency Identification (RFID) Systems (National Institute of Standards and Technology, Washington, DC, 2007).
    • T. Karygiannis et al., Guidelines for Securing Radio Frequency Identification (RFID) Systems (National Institute of Standards and Technology, Washington, DC, 2007).
  • 13
    • 63049097166 scopus 로고    scopus 로고
    • The guidelines include firewalls that separate RFID databases from other databases, signal encryption, authentication of users, prevention of unauthorized access, and tag disposal to destroy sensitive data
    • The guidelines include firewalls that separate RFID databases from other databases, signal encryption, authentication of users, prevention of unauthorized access, and tag disposal to destroy sensitive data.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.