Skip to main navigation
Skip to search
Skip to main content
University of Canberra Research Portal Home
Home
Profiles
Research output
Projects
Press/Media
Activities
Research units
Prizes
Student theses
Impacts
Search by expertise, name or affiliation
HJM Tree for Security Analyses of Pass RFID Systems
Xu Huang
Information Systems
Research output
:
A Conference proceeding or a Chapter in Book
›
Chapter
›
peer-review
1
Citation (Scopus)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'HJM Tree for Security Analyses of Pass RFID Systems'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Security Issues
100%
Privacy Concerns
100%
Radio Frequency Identification System
100%
Security Analysis
100%
Radio Frequency Identification Technology
100%
Value Chain
50%
Wireless Devices
50%
Radio Frequency Identification
50%
Air Force
50%
Royal
50%
Business-to-business
50%
Security Privacy
50%
Internal Operations
50%
Impersonation
50%
Second World War
50%
Authentication Protocol
50%
Low-cost Device
50%
B-2-B
50%
Adversary
50%
Work Context
50%
Work System
50%
Denial of Service
50%
Storage Capacity
50%
Computational Capacity
50%
Radio Frequency Identification Applications
50%
Asymmetric Cryptography
50%
Task Structure
50%
After-sales Service
50%
Computer Science
Radio Frequency Identification
100%
Security Analysis
100%
radio frequency identification technology
50%
Security and Privacy
25%
Business-to-Business
25%
Business Operation
25%
Asymmetric Cryptography
25%
Internal Logistics
25%
Wireless Device
25%
Value Chain
25%
Denial-of-Service Attack
25%
Service Application
25%
Authorized Party
25%
Privacy Problem
25%
Authentication Protocol
25%
Work Structure
25%
Storage Capacity
25%
Computational Capacity
25%