Location:
Search - RFID security
Search list
Description: RFID.Security指南
安全性是rfid的重要因素,本书详细探讨了rfid的安全性问题,英文-RFID.Security Guide rfid safety is an important factor, The book explored in detail the rfid security issue, English
Platform: |
Size: 4349642 |
Author: lilin |
Hits:
Description: RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006
Platform: |
Size: 4327181 |
Author: wfy |
Hits:
Description: RFID.Security指南
安全性是rfid的重要因素,本书详细探讨了rfid的安全性问题,英文-RFID.Security Guide rfid safety is an important factor, The book explored in detail the rfid security issue, English
Platform: |
Size: 4348928 |
Author: lilin |
Hits:
Description: RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006-RFID Security- F. Thornton, B. Haines, A. Das, et al- Syngress- 2006
Platform: |
Size: 4327424 |
Author: wfy |
Hits:
Description: Radio Frequency Identification [RFID]
systems have become popular for
automated identification and supply chain
applications. This article describes the
technical fundamentals of RFID systems
and the associated standards. Specifically,
we address the security and privacy aspects
of this relatively new and heterogeneous
radio technology. We discuss the related
security requirements, the threats and the
implemented mechanisms. Then the current
security and privacy proposals and their
enhancements are presented. Finally we
discuss the role of this technology in
Ubiquitous Computing-The automated identification of objects
with electromagnetic fields is the major
purpose of the RFID [Radio Frequency
Identification] technology. An RFID system
basically consists of transponders [tags],
readers [scanners] and application systems
for further processing of the acquired data.
There is a large variety of different RFID
systems: they may use low, high or ultra
high frequencies, the transponder may emit
only a fixed identifier or possess
significant memory and processing
capabilities. Transponders may incorporate
no security features at all or realise
effective security protocols similar to
smartcards. Most transponders are
passively powered by the radio field
emitted by the reader but there are also
active tags with a separate power supply.
The transponder design is also little
uniform: there are e.g. tiny tags with a size
of several millimetres, very thin “smart
labels” or standard ID-1 cards
Platform: |
Size: 357376 |
Author: 胡利建 |
Hits:
Description: RFID – An introduction
RFID tags, security and the individual-When I lastwrote for CSLR, RFID tagswere but a glimmer in
some scientist’s eye. The thought that by 2006 they would be
in everyday use [even if we did not know it] was unthinkable.
However, the fact is that technology hasmoved on and RFID is
the next big thing – or rather the next very small thing, as the
major advances in technology relate to miniaturisation.
Platform: |
Size: 78848 |
Author: 胡利建 |
Hits:
Description: RFID, the wireless technology that has helped
millions of people around the world to protect their property and
make their workplaces safer is now in danger of being viewed as a
security risk. Ray Stanton examines the love-hate relationship
between people and Radio Frequency Identification [RFID] tags and
highlights the need for informed debate about the privacy issues the
technology raises.-Sometimes it seems we have a love-hate
relationship with technology, and that’s
certainly the case with RFID.
On the one hand, the tags are just
high-tech barcodes – attached to items
to allow them to be tracked through the
supply chain and make life easier at
supermarket checkouts.
Platform: |
Size: 106496 |
Author: 胡利建 |
Hits:
Description: Embedded Security Analysis
of RFID Devices
Platform: |
Size: 3935232 |
Author: Khan |
Hits:
Description: RFID Security protocols
Platform: |
Size: 5712896 |
Author: Farhan |
Hits:
Description: this book is about the concerns about RFiD security and privacy and includes solutions.
Platform: |
Size: 10690560 |
Author: burcin |
Hits:
Description: An RFID Security Module
Platform: |
Size: 774144 |
Author: Hasan |
Hits:
Description: RFID Security check and assesment
Platform: |
Size: 10250240 |
Author: ndrie |
Hits:
Description: rfid application for security purpose
Platform: |
Size: 7168 |
Author: Pradeep |
Hits:
Description: This Power Point slide talks about RFID technology overview.
Contents:
+ Introduction.
+ Basic Features.
+ Related Technologies.
+ Applications.
+ Security Aspects.
Platform: |
Size: 594944 |
Author: Tan Son |
Hits:
Description: RFID的IEEE 的文章
Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing.pdf
Security of an RFID Protocol for Supply Chains.pdf
Server Impersonation Attacks on RFID Protocols.pdf
Untraceable RFID authentication protocols_ Revision of EC-RAC.pdf
YA-SRAP_ Yet another serverless RFID authentication protocol.pdf-Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing.pdf
Security of an RFID Protocol for Supply Chains.pdf
Server Impersonation Attacks on RFID Protocols.pdf
Untraceable RFID authentication protocols_ Revision of EC-RAC.pdf
YA-SRAP_ Yet another serverless RFID authentication protocol.pdf
Platform: |
Size: 2362368 |
Author: fxy |
Hits:
Description: This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside.
RFID Reader Module, are also called as interrogators.
Platform: |
Size: 111616 |
Author: Binu |
Hits:
Description: rfid商品防伪系统,基于对RFID系统建设的研究-rfid security system products, based on the construction of RFID system
Platform: |
Size: 3194880 |
Author: 小丫 |
Hits:
Description: 。重点研究了RFID 防伪体系中关键技术的设计,利用RFID 中间件实现射频标签
和读写器相互认证;-Focuses on key technologies in the RFID security system design, the use of RFID tags RFID middleware
And the reader mutual authentication
Platform: |
Size: 621568 |
Author: bxfg |
Hits:
Description: RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006
Platform: |
Size: 4415488 |
Author: dimatteo |
Hits:
Description: RFID Security - Techniques, Protocols and System-on-Chip Design
Platform: |
Size: 6103040 |
Author: Benjamin |
Hits: