NFC based inventory control system for secure and efficient communication

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Communication Model for HCE based NFC Services

Near Field Communication (NFC) is a new promising short-range wireless communication technology that provides ease of use by triggering the communication with a simple touch and making the user feel secure by short distance communication. Most promising functionality of NFC technology is via card emulation operating mode that enables an NFC Smartphone to behave like a contactless smart card. By...

متن کامل

A secure and efficient inventory management system for disasters

An efficient humanitarian inventory control model and emergency logistics system plays a crucial role in maintaining reliable flow of vital supplies to the victims located in the shelters and minimizing the impacts of the unforeseen disruptions that can occur. This system should not only allow the efficient usage and distribution of emergency supplies but should also offer the ability to be int...

متن کامل

Efficient HMAC-based secure communication for VANETs

Vehicular ad hoc network (VANET) is an emerging type of network which facilitates vehicles on roads to communicate for driving safety. It requires a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles which do not obey the rules. Most existing solutions either do not have an effective message verification scheme , or use the Public Key Infrastructure...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Engineering and Applications Journal

سال: 2014

ISSN: 2252-5459,2252-4274

DOI: 10.18495/comengapp.v3i1.50