نتایج جستجو برای: ouafi

تعداد نتایج: 18  

Journal: :CoRR 2016
Seyed Salman Sajjadi GhaemMaghami Afrooz Haghbin Mahtab Mirmohseni

Radio Frequency IDentification (RFID) is a pioneer technology which has depicted a new lifestyle for humanity in all around the world. Every day we observe an increase in the scope of RFID applications and no one cannot withdraw its numerous usage around him/herself. An important issue which should be considered is providing privacy and security requirements of an RFID system. Recently in 2014,...

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

B. Abdolmaleki K. Baghery M. J. Emadi

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

A. Haghbin, M. Mirmohseni, S. Sajjadi Ghaemmaghami

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

Journal: :IJMMME 2012
Salah Haridy Zhang Wu Amro Shafik

Computer numerical control (CNC) involves machines controlled by electronic systems designed to accept numerical data and other instructions, usually in a coded form. CNC machines are more productive than conventional equipment and consequently produce parts at less cost and higher accuracy even when the higher investment is considered. This article proposes an educational scheme for designing ...

Journal: :Progress in Photovoltaics 2022

In order to help readers stay up-to-date in the field, each issue of Progress Photovoltaics will contain a list recently published journal articles that are most relevant its aims and scope. This is drawn from an extremely wide range journals, including IEEE Journal Photovoltaics, Solar Energy Materials Cells, Renewable Energy, Sustainable Reviews, Applied Physics, Physics Letters. To assist re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید