نتایج جستجو برای: rfid tags
تعداد نتایج: 24998 فیلتر نتایج به سال:
RFID (radio frequency identification) technology has already proved its use in various areas such as security, library, airline, military, animal forms, sports and other areas. RFID is being used for various applications in many industries. For example, equipment tracking, access controls including personal and vehicle, logistic, baggage, items security in departmental store. The main advantage...
Radio Frequency Identification (RFID) systems promise a revolution in logistics and inventory applications. By means of wireless communication, a master device can detect and identify nearby electronic tags. Traditionally, the performance of RFID systems and their identification protocols has been analyzed for static configurations, that is, without considering incoming or outgoing tags, but ju...
Dynamic framed slotted ALOHA (DFSA) protocol has been widely used in many RFID systems. According to the information from last frame (e.g. the number of idle, success and collision slots), DFSA dynamically adjusts the next frame size so as to reach higher identification efficiency. The process is known as tag estimation of DFSA. Similar to most existing tag anti-collision protocols, The DFSA in...
Low-cost Radio Frequency Identification (RFID) tags are devices with very limited computational capability, in which only 250-4K logic gates can be devoted to securityrelated tasks. Classical cryptographic primitives such as block ciphers or hash functions are well beyond the computational capabilities of low-cost RFID tags, as ratified by the EPCglobal Class-1 Gen-2 RFID specification. Moreove...
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication abilities of a typical RFID tag. This paper describes a step-by-step construction of a family of simple protocols for inexpensive untraceable identification and authentication of RFID tags. This work is aimed primarily ...
In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields from military to industry applications. RFID tags have been embedded into many various products especially in logistics sector. A tag stores individual information of its attached object and an RFID reader communicates with the tag in radio frequencies to identify the object. This object to be monitor...
With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view information about RFID tagged items. As RFID tags, mobile phones can quickly identify themselves in order to communicate with other tagged devices, which pr...
An RFID network consists of a set of tags and readers. The cost and the number of tags covered directly depend on the number of readers. So, finding optimal number of readers and their positions to cover all tags is one of the most important issues in an RFID network. In this paper, we have proposed a reader placement technique in a departmental store equipped with RFID network using Particle S...
It is tempting to regard RFID security and privacy primarily as questions of cryptographic protocol design. We would like RFID tags to authenticate themselves in a trustworthy manner. We would also like them to protect the identities and personal data of their bearers. We might imagine that our aims should be to squeeze cryptographic primitives down to the constrained environments of RFID tags ...
Radio Frequency Identification (RFID) is an emerging technology, which brings enormous productivity benefits in applications, where objects have to be identified automatically. This paper presents issues concerning security and privacy of RFID systems. RFID tags are a new generation of barcodes with added functionality. The risk related to using the tags for several applications. In particular ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید