Real Time Authentication System for RFID Applications

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID Complex Event Processing: Applications in Real-Time Locating System

Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We o...

متن کامل

Simulation of a Neutron Detector for Real Time Imaging Applications

Monte Carlo Method is used to simulate a double layer gadolinium-amorphous silicon thermal neutron detector. The detector fabricated in pixel array configuration has various applications including neutron imaging. According to the simulation results, a detector consisting of a gadolinium (Gd) film with thickness of 2-4 ~m, sandwiched properly with two layers of sufficiently thick (-30 ?µm) hydr...

متن کامل

Zero-Stop Authentication: Sensor-Based Real-Time Authentication System

This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing s...

متن کامل

A Real-time Localization System Using RFID for Visually Impaired

Gadgets helping the disabled, especially blind that are in least accessibility of information, use acoustic methods that can cause stress to ear and infringe user‟s privacy. Even if some project uses embedded Radio Frequency Identification (RFID) into the sidewalk for blind‟s free walking, the tag memory design is not specified for buildings and road conditions. This paper suggested allocation ...

متن کامل

A zero-stop authentication system for sensor-based embedded real-time applications

This paper proposes “Zero-stop Authentication” model and system, which realizes automatic, real-time authentication in the physical world. Applications in the physical environment such as those at library gates and supermarket counters could benefit from automatic authentication of users. These applications need to detect users using embedded sensors, and authenticate them, and bind objects to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Science and Technology

سال: 2014

ISSN: 0974-6846,0974-5645

DOI: 10.17485/ijst/2014/v7sp3.23