A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions

Author(s):  
Krishan Sabaragamu Koralalage ◽  
Jingde Cheng
Author(s):  
B. Tarakeswara Rao ◽  
R.S.M. Lakshmi Patibandla ◽  
V. Lakshman Narayana

2022 ◽  
pp. 132-144
Author(s):  
Sneha Padhiar ◽  
Kuldip Hiralal Mori

With the rise in use of internet in various fields like education, military, government sector, banking, the security and privacy of the info has been the foremost concern. As in today's era, most of the handling of data and transactions are done online. When the data is transferred from the one end of sender to the other end of receiver online, it's eavesdropped by an intruder and thus could be a threat to the secrecy or confidentiality of the info. The hottest technique that protects the confidentiality of the data is cryptography which converts the plain text into scrambled form which is unreadable. Then the receiver applies a reverse mechanism to decrypt the unreadable data to readable form. This mechanism is known as encryption-decryption process or cryptography. Cryptography can be both symmetric and asymmetric. Here the authors discuss symmetric and asymmetric algorithms.


2020 ◽  
Author(s):  
Bruno Oliveira Ferreira de Souza ◽  
Éve‐Marie Frigon ◽  
Robert Tremblay‐Laliberté ◽  
Christian Casanova ◽  
Denis Boire

Sign in / Sign up

Export Citation Format

Share Document