Real Time Authentication System for RFID Applications
نویسندگان
چکیده
منابع مشابه
RFID Complex Event Processing: Applications in Real-Time Locating System
Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We o...
متن کاملSimulation of a Neutron Detector for Real Time Imaging Applications
Monte Carlo Method is used to simulate a double layer gadolinium-amorphous silicon thermal neutron detector. The detector fabricated in pixel array configuration has various applications including neutron imaging. According to the simulation results, a detector consisting of a gadolinium (Gd) film with thickness of 2-4 ~m, sandwiched properly with two layers of sufficiently thick (-30 ?µm) hydr...
متن کاملZero-Stop Authentication: Sensor-Based Real-Time Authentication System
This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing s...
متن کاملA Real-time Localization System Using RFID for Visually Impaired
Gadgets helping the disabled, especially blind that are in least accessibility of information, use acoustic methods that can cause stress to ear and infringe user‟s privacy. Even if some project uses embedded Radio Frequency Identification (RFID) into the sidewalk for blind‟s free walking, the tag memory design is not specified for buildings and road conditions. This paper suggested allocation ...
متن کاملA zero-stop authentication system for sensor-based embedded real-time applications
This paper proposes “Zero-stop Authentication” model and system, which realizes automatic, real-time authentication in the physical world. Applications in the physical environment such as those at library gates and supermarket counters could benefit from automatic authentication of users. These applications need to detect users using embedded sensors, and authenticate them, and bind objects to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2014
ISSN: 0974-6846,0974-5645
DOI: 10.17485/ijst/2014/v7sp3.23