The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Computer System Attacks
Abstract
The study of computer system attacks is an important part RFID security and privacy. This chapter provides a general overview of computer system attacks organized by target. Attacks on EPC entities - tags, readers, middleware, and back-end systems - are categorized and discussed, as well as wired link attacks. Countermeasures to the attacks are summarized and evaluated based on the discussion. The Denial of Services (DoS) attack is highlighted in the discussion.
Related Content
Christopher Nyakotyo, Pedzisai Goronga.
© 2024.
18 pages.
|
Colleen Halupa.
© 2024.
23 pages.
|
Stefan Handke.
© 2024.
14 pages.
|
Jaime Santos-Reyes, Galdino Santos-Reyes, Ricardo Tejeida-Padilla.
© 2024.
19 pages.
|
Ahmad Kayaly.
© 2024.
20 pages.
|
Elizabeth Stroble.
© 2024.
15 pages.
|
Mubango Hazel, Hlanganipai Ngirande, Khathutshelo Khashane.
© 2024.
20 pages.
|
|
|