نتایج جستجو برای: rfid applications

تعداد نتایج: 616818  

2014
Chien-Ming Chen Shuai-Min Chen Xinying Zheng Lijun Yan Huaxiong Wang Hung-Min Sun

RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed an RFID authentication protocol based on error correction codes (ECC) to secure RFID systems with untraceability, which is one of the most critical privacy issues on RFID. In thi...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

2008
W. Yao C. H. Chu

Radio Frequency Identification (RFID) has emerged as a key technology for automatic data collection and asset tracking and has been adopted in a variety of industries. However, the large volume and high velocity of data poses a major challenge for maintaining data processing efficiency and effectiveness. One viable solution for dealing with this challenge is Complex Event Processing (CEP), whic...

2014
Henrik Schmidt

Automatic Identification Technology (AIT) has numerous potential applications in the maritime field. By putting AIT tracking devices, such as Radio Frequency Identification (RFID) tags, on materials and equipment, items can be accurately located, tracked, and recovered, while reducing the manpower and other costs associated with these tasks. This results in more efficient movement and utilizati...

2006
Sangshin Lee Hyunrok Lee Tomoyuki Asano Kwangjo Kim

Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...

2005
Manfred Aigner Martin Feldhofer

The project ART proposes to enhance passive RFID (Radio Frequency Identification) tags with cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of curre...

Journal: :Computer Communications 2021

Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number novel identification and authentication based systems such as Radio frequency (RFID), which is expected replace the conventional bar-code system due its advantages real-time recognition considerable objects. For example, RFID can be used identify an unmanned aerial vehicle (UAV) when it attached wit...

A. Haghbin, M. Mirmohseni, S. Sajjadi Ghaemmaghami

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

2010
ILKER KORKMAZ COSKUN ATAY

In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields from military to industry applications. RFID tags have been embedded into many various products especially in logistics sector. A tag stores individual information of its attached object and an RFID reader communicates with the tag in radio frequencies to identify the object. This object to be monitor...

2006
Divyan M. Konidala Kwangjo Kim

With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view information about RFID tagged items. As RFID tags, mobile phones can quickly identify themselves in order to communicate with other tagged devices, which pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید