نتایج جستجو برای: rfid tags

تعداد نتایج: 24998  

2009
Songyi Kim

RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many res...

2009
M Ayoub Khan Manoj Sharma Brahmanandha Prabhu

The Radio Frequency Identification System (RFID) has become a popular system and its applications has reached in most of the fields like toll bridge, supply chain management and defense sector [8]. The RFID has also entered into the field of medical sciences [4, 7]. Everyday, RFID tags are becoming very small and their dimensions are also reducing to 0.002 inches (RFID powder tag) developed by ...

2005
Claudia Löbbecke

RFID (Radio Frequency Identification) recently has gained enormous attention in various industry sectors, the media, and in academic research. This paper focuses in early RFID applications in the retail supply chain. It takes a quick look at the available literature and then explains the technological issues including the need for standardization and the challenges on the data, network, and app...

2009
TZAY-FARN SHIH WEN-LI HSU

-Radio frequency identification (RFID) is an automatic identification system working through radio frequency (RF). Tag collision occurs while two or more than two tags deliver their unique identification (UID) to the reader. Since collision, which would significantly affect the efficacy of RFID, has been one of the major study issues for RFID technology, we have developed a solution, bit compet...

2011
Namje Park Kwang-Woo Lee Sangkeun Yoo Junseob Lee Youngwoon Kim Hyoungjun Kim

We propose a secure framework for mobile-phone based RFID service using personal privacy policy based access control for personalized ultrahigh frequency (UHF) tags employing the Electronic Product Code (EPC). The framework, called mobile RPS, has dynamic capabilities that extend upon extent trust-building service mechanisms for RFID systems. This new technology aims to provide absolute confide...

2011
Lejla Batina Stefaan Seys Dave Singelée Ingrid Verbauwhede

RFID (Radio Frequency Identification) technology enables readers to scan remote RFID tags, and label the objects and people to which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments are often not compatible, or reveal too much information to the RFID readers. To tackle this problem, we introduce the concept of RFID groups and propose a hie...

2013
Jianxin Deng

Vehicle tracking plays more important roles in modern transportation and logistics operation. This paper deals with a new approach to track vehicles based on RFID (Radio Frequency Identification) technology. The vehicle tracking system is designed overallly supported by Axiomatic Design theory. The basic steps of vehicle tracking based on RFID are developed and a six-layered architecture for th...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi Somitra Kumar Sanadhya

Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in various practical applications these days. Security analysis of the way these tags are used in an application is a must for successful adoption of the RFID technology. Depending on the requirements of the particular application, security demands on these tags cover some or all of the aspects such as privacy, ...

2011
Sarita Pais Judith Symonds

RFID tags can store more than just a tag ID. Data on an RFID tag can be updated through local processing. This is in contrast to the EPC global standard of data-on-network. The research study explores how much data can be stored on an RFID tag. The scope of this study is to find a suitable data format for data stored in the tags. Two data formats viz CSV and XML along with compression technique...

Journal: :Int. J. Computational Intelligence Systems 2012
Ya-li Liu Xiaolin Qin Bo-Han Li Liu Liang

Designing secure and robust gr ouping-proof protocols based o n RFID characte ristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocol s recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید