TITLE

Security Opportunity

PUB. DATE
December 2007
SOURCE
Red Herring;12/1/2007, Vol. 4 Issue 30, p13
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents the forecast of Reston, Virginia-based research firm Input on U.S. government spending on security software. It predicts that U.S. government spending will increase 6.2 percent annually to $439 million in 2012, a trend expected to spur government contractors to buy startups in areas like smart cards, biometrics, radio frequency identification and speech recognition. Companies like Microsoft, EDS, BearingPoint and Johnson Controls could be looking for small, specialized firms as subcontractors or acquisition targets, said the author of Input's latest report.
ACCESSION #
28819228

 

Related Articles

  • Cryptography for Resource Constrained Devices: A Survey. John, Jacob // International Journal on Computer Science & Engineering;Nov2012, Vol. 4 Issue 11, p1766 

    Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected...

  • Systematic Design of High-Performance Smart Card with HF/UHF Dual-Band RFID Tag. Gi-Hyun Hwang; Dae-Ki Kang // International Journal of Smart Home;Apr2012, Vol. 6 Issue 2, p83 

    Recently, there have been widely conducted researches on dual-band radio frequency identification (RFID) tag based on 13.56 MHz (HF) and 900 MHz (UHF). Most dual-band RFID tag has been implemented so that each antenna is separated in a different inlay sheet respectively, which makes the...

  • Blunting Brute-Force Attacks. Roberti, Mark // RFID Journal;Sep/Oct2012, Vol. 9 Issue 5, p6 

    The article reports that the researchers at Dartmouth College, the University of California at Berkeley and the University of Massachusetts-Amherst have developed a software program to check all possible encryption schemes to crack brute-force attacks on radio frequency identification (RFID)...

  • by the numbers. Despeignes, Peronet // Fortune;5/30/2005, Vol. 151 Issue 11, p30 

    Focuses on U.S. federal primary contract spending. Number of private-sector contractors working for the U.S. government, according to Paul Light of the Brookings Institution; The rise in federal funds committed to primary contractors; Information on the annual budget for private-sector...

  • Contactless smartcards take off in the Far East. Riley, John // Computer Weekly;11/14/2002, p6 

    Reports on the popularity of contactless smartcard applications using radio frequency identification technology for e-payments in Great Britain. Comparison of octopus card used for the Hong Kong public transport system and Sony's EDY e-purse used in Japan; Benefits of RFID cards.

  • When RFID Goes Bad. Hoffman, William // Traffic World;3/27/2006, Vol. 270 Issue 13, p15 

    The article reports on the creation of a self-replicating, proof-of-concept virus that could trick a radio frequency identification (RFID)-connected computer into executing malicious software or cause other kinds of havoc in a track-and-trace system in the U.S. The researcher said the RFID...

  • Short Takes.  // Network World;4/12/2004, Vol. 21 Issue 15, p25 

    This summary highlights developments in the enterprise application area in the U.S. as of April 2004. Microsoft is scheduled to hold the first meeting of the Microsoft RFID Council. The council was formed to address radio frequency identification opportunities. Vendors participating in the...

  • RFID tags vulnerable.  // SC Magazine: For IT Security Professionals (UK Edition);Apr2006, p14 

    The article reports the conclusion of the scientists at Amsterdam's Free University in Netherlands as of April 2006 that radio frequency identification (RFID) tags are susceptible to computer viruses. The tags, commonly found in household goods, passports and public transport tickets, can be...

  • Here come RFID-enabled passports. Fontana, John // Network World;9/25/2006, Vol. 23 Issue 37, p18 

    The article focuses on the shift to the issuance of radio frequency identification (RFID)-enabled passport by the U.S. government. Those who are concerned with potential security and privacy flaws in the new electronic passport can still get the paper-based passports. The electronic passport is...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics