نتایج جستجو برای: rfid tags
تعداد نتایج: 24998 فیلتر نتایج به سال:
Radio frequency identification (RFID) is a promising wireless technology for using tiny, remotely powered chips as identifiers. The number of RFID applications is rapidly increasing because RFID technology is convenient, fast, and contactless. However, collisions occur when multiple tags simultaneously transmit their IDs. Therefore, an efficient anti-collision algorithm is needed to accelerate ...
Implementing public-key cryptography on passive RFID tags is very challenging due to the limited die size and power available. Typical public-key algorithms require complex logical components such as modular exponentiation in RSA. We demonstrate the feasibility of implementing public-key encryption on low-power, low cost passive RFID tags to large-scale private identification. We use Oded Regev...
RFID systems are widely used in various applications, and attaching RFID tags to objects are increasing. Recently, Xie et al. defined RFID seeking concept which is finding a lost tag in a blind spot or a specified tag among lots of similar ones and proposed a lightweight RFID seeking protocol. Their protocol provides security and privacy against most of common malicious attacks. However, since ...
The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make the user vulnerable. We are proposing an advanced mutualauthentication protocol betwee...
Radio frequency identification (RFID) is a mature technology, which allows performing contactless data readout via wireless communication links. While protocols in this field are subject to regulations, there room of opportunities improve the hardware realization antennas devices, support technology. In particular, range extension and miniaturization passive RFID tags an important objective wit...
Radio Frequency Identi cation (RFID) tags are used to track inventory and for automatic recognition of ID cards and passports. Reproduction of the electronic equivalent of an RFID chip, commonly known as RFID cloning, is a straightforward process and can lead to serious security breaches. A cloned RFID badge can allow for unauthorized access to secured areas. Speci c Emitter Identi cation (SEI)...
RFID (Radio Frequency Identification) recently has gained enormous attention in various industry sectors, the media, and in academic research. This paper focuses in early RFID applications in the retail supply chain. It takes a quick look at the available literature and then explains the technological issues including the need for standardization and the challenges on the data, network, and app...
Radio frequency identification (RFID) networks are an emerging type of network that is posed to play an important role in the Internet-of-Things (IoT). One of the most critical issues facing RFID networks is that of security. Unlike conventional networks, RFID networks are characterized by the use of computationally weak RFID tags. These tags come with even more stringent resource constraints t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید