RFID & Mobile Fusion for Authenticated ATM Transaction

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

A Novel Authenticated Cipher for Rfid Systems

In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data bits to change the location of the plaintext bits in the transmitted data without changing their order. The location of redundant bits inside the transmitted data represents the secret key...

متن کامل

RFID for mobile applications

The availability of fast anti-collision algorithms is crucial for most RFID applications. This paper aims to evaluate these algorithms for applications in which it is not intended to identify the entirety of moving objects but to detect as much tags as needed to allow orientation. The navigation of Automated Guided Vehicles (AGV) by distributed landmarks is an example which clarifies the discri...

متن کامل

TITLE : A Framework for Authenticated Key Distribution in ATM

This contribution proposes a framework for authenticated key distribution in ATM networks in endpoint-to-endpoint, switch-to-switch, and endpoint-to-switch settings. The proposal is for a two-tiered hierarchy with initial pairwise key distribution based on public key cryptography and subsequent session key distribution based on conventional cryptography. All protocols are derived from existing ...

متن کامل

A Lightweight Authenticated Encryption Algorithm for RFID Systems

Security of RFID systems is a very important issue with the increasing of their applications. To achieve secure communications between a reader and a tag in RFID systems, encryption of the communication data is usually performed. However, in case of low-cost RFID tags, it is difficult for them to adopt the well-known encryption algorithms because the tags have very limited resources to implemen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2010

ISSN: 0975-8887

DOI: 10.5120/731-1025