scrape 发表于 2025-3-27 00:54:05
http://reply.papertrans.cn/83/8202/820115/820115_31.png环形 发表于 2025-3-27 02:27:10
http://reply.papertrans.cn/83/8202/820115/820115_32.pngAphorism 发表于 2025-3-27 08:31:28
http://reply.papertrans.cn/83/8202/820115/820115_33.png神圣在玷污 发表于 2025-3-27 11:23:33
RFID Readers Deployment for Scalable Identification of Private Tags the distribution of RFID readers, with the aim to provide security and privacy in a scalable fashion..In order to test our method, we have developed a simulator that is presented in this chapter. By using this simulator we study the distribution of several kinds of readers on a variety of scenarios, and we report some of the obtained results.Itinerant 发表于 2025-3-27 14:16:50
http://reply.papertrans.cn/83/8202/820115/820115_35.png下级 发表于 2025-3-27 17:55:25
RFID Security and Privacystart by building some background on the types, characteristics, and applications of RFID systems. Then we will describe some of the potential uses and abuses of this technology, discuss in more detail the attacks that can be applied to RFID systems and, finally, review some of the countermeasures that have been proposed to date.aptitude 发表于 2025-3-28 01:51:46
RFID Security: Cryptography and Physics Perspectivesled (or killed) tag whenever the user considers it to be safe. We discuss the security and describe usage scenarios for all solutions. Finally, we summarize previous works that use physical principles to provide security and privacy in RFID systems and the security-related functionality in RFID standards.Arb853 发表于 2025-3-28 05:56:25
Using RFID-based “Touch” for Intuitive User Interaction with Smart Space SecurityC middleware, called iTouch. We present the overall architecture, as well as the detailed design of the necessary NFC records that are exchanged over RF. Finally, we present our experience with an initial implementation of parts of the proposed middleware using actual NFC hardware and Symbian-based mobile phones.CRAMP 发表于 2025-3-28 08:01:55
Hardware Implementation of Symmetric Algorithms for RFID Securitygorithms are compared with the new upcoming stream ciphers Grain and Trivium. The comparison of the achieved results favors the use of the AES algorithm for application of symmetric cryptography in RFID security.纵火 发表于 2025-3-28 13:34:41
http://reply.papertrans.cn/83/8202/820115/820115_40.png