메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Security aspects in vulnerable RFID-aided supply chains

Author keywords

[No Author keywords available]

Indexed keywords

CONSUMER PROTECTION; DATA PRIVACY; SUPPLY CHAINS;

EID: 84964029309     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 3
    • 85091995584 scopus 로고    scopus 로고
    • EPCglobal Inc
    • EPCglobal Inc., Tag Data Standards 1.4, http://www.epcglobalinc.org/standards/tds/tds_1_4-standard-20080611.pdf, 2008.
    • (2008) Tag Data Standards 1.4
  • 5
    • 48349106601 scopus 로고    scopus 로고
    • A Study on MITM Vulnerability in Wireless Network Using 802.1X and EAP
    • (Washington, DC, USA), IEEE Computer Society
    • Hyunuk Hwang et al., A Study on MITM Vulnerability in Wireless Network Using 802.1X and EAP, Proceedings of the International Conference on Information Science and Security (Washington, DC, USA), IEEE Computer Society, 2008, pp. 164-170.
    • (2008) Proceedings of the International Conference on Information Science and Security , pp. 164-170
    • Hwang, Hyunuk1
  • 16
    • 64849099080 scopus 로고    scopus 로고
    • The Challenges of Using an Intrusion Detection System: Is it Worth the Effort?
    • (New York, NY, USA), ACM
    • Rodrigo Werlinger et al., The Challenges of Using an Intrusion Detection System: Is it Worth the Effort?, Proceedings of the 4th Symposium on Usable Privacy and Security (New York, NY, USA), ACM, 2008, pp. 107-118.
    • (2008) Proceedings of the 4th Symposium on Usable Privacy and Security , pp. 107-118
    • Werlinger, Rodrigo1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.