نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

Journal: :The KIPS Transactions:PartC 2010

2009
Songyi Kim

RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many res...

2012
Omar Abdelmalek David Hely Vincent Beroulle

RFID ICs such as EPC gen2 tag are low cost tags which can be used for critical or secure applications. Increasing their robustness is not trivial due to the wide range of error sinks (EM perturbation, attacks...). Moreover increasing the robustness must have a minimum impact on the die area but also must fit with a standardized protocol. In this work we propose a design methodology in order to ...

Journal: :J. Computational Applied Mathematics 2011
Masoumeh Safkhani Nasour Bagheri Ali Mahani

Recently Qian et al. [38] have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags’ private information. They have stated that most of the existing RFID mutual authentication protocols are vulnerable to this attack. To defend against counting attack, they propose a novel Anti-Counting Sec...

2010
TAI-HOON KIM Tai-Hoon Kim

To uniquely identify physical objects, Radio Frequency Identification (RFID) systems are used with its limitless possibilities and low cost. RFID is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. But with this common scenario involving numerous ta...

2004
Eth Zürich

Abstract Due to their limitless possibilities and low cost, RFID systems are powerful object identi cation tools well-suited in everyday applications. When attempting to identify multiple RFID tags from densely populated elds within the shortest timeframe possible, the typical design characteristics of RFID systems lead to a problematic lack of adequate resources to e ciently do so. After a bri...

Journal: :J. Inf. Sci. Eng. 2011
Kuo-Hui Yeh Nai-Wei Lo Enrico Winata

With the ability of recognizing tag content wirelessly within a limited distance and a short period of query time, RFID technology has been adopted and deployed on various applications. In consequence, how to effectively avoid responses collision from multiple tags and to further reduce the average query time per tag becomes an important performance issue for RFID systems. To get better perform...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید