IEEE Access Special Section: Radio Frequency Identification and Security Techniques

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IEEE Access Special Section Editorial: Security and Reliability Aware System Design for Mobile Computing Devices

It is a well-known fact that design productivity is failing to keep pace with the big increase in the demands of applications and advanced silicon technology, especially in the domain of portable electronics. Moreover owing to the massive complexity of modern systems-on-chip (SoC), complete in-house development is impossible, and thus globalization of the design process has established itself a...

متن کامل

Radio Frequency Identification (RFID): Privacy and Security

Despite its long history, Radio Frequency Identification (RFID) is considered as one of the most promising wireless technology in future ubiquitous computing environments. However, it’s a very different form of technology than today’s other wireless dominants such as cellular, satellite, and wireless computer networks. In short, RFID is a contactless, automatic, ultra-light, super-cheap, and ex...

متن کامل

IEEE Access Special Section Editorial: Index Modulation Techniques for Next-Generation Wireless Networks

Index modulation (IM) techniques appear as competitive candidates for next-generation (5G and beyond) wireless networks due to the attractive advantages they offer in terms of spectral and energy efficiency as well as hardware simplicity. IM is a highly spectrumand energyefficient yet simple digital modulation technique, which utilizes the indices of the building blocks of the corresponding com...

متن کامل

Security Aspects in Radio Frequency Identification Systems

Radio frequency identification technology is becoming ubiquitous, and as an unfortunate side effect, more and more authentication solutions come with more security issues. In former contributions, the authors introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks and performs exceptionally well even in very l...

متن کامل

I. Radio-Frequency Identification: Security Risks and Challenges

Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as “smartlabels” may emerge as one of the most pervasive computing technologies in history. While RFID systems can yield great productivity gains, they may also expose new threats to the security and privacy of both individuals and organizations. This article gives a brief introduction to RFID technology and describes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2019.2956280