[PDF][PDF] 基于云的RFID 相互认证协议

陈萌萌, 董庆宽, 李璐璐 - 密码学报, 2018 - jcr.cacrnet.org.cn
cloud-based RFID mutual authentication protocol, the protocol is designed based on the hash
function, it realizes the authentication … A proposed RFID authentication protocol based on …

[PDF][PDF] 基于云数据库的低成本RFID 认证协议

童嘉庆, 董庆宽, 霍伟光 - 密码学报, 2015 - jcr.cacrnet.org.cn
cloud based RFID systems become more serious than those of traditional RFID systems.
In this paper, an RFID authentication protocol based on cloud database using one-way hash …

商業計畫: 二維碼雲端門禁系統

I Cheng - 臺灣大學企業管理碩士專班學位論文, 2022 - airitilibrary.com
… In this thesis, the business plan for a QR code cloud-based … In this thesis, a new QR code
cloud-based access control … the functions of QR code cloud-based access control systems. The …

[引用][C] 基于云的轻量级RFID 群组标签认证协议(Cloud-based Lightweight RFID Group Tag Authentication Protocol).

L Li, Q Dong, M Chen - 计算机科学, 2019

基于云端感测科技之智能物流服务系统

王亦璋, 陈一元 - Service Science and Management, 2015 - hanspub.org
… With the cloud-based smart IOT management platform, the large volume of real-time temperature
and location data captured from the smart containers can be effectively stored, tracked, …

一种基于字合成运算的射频识别双向认证协议

占善华, 黄少荣 - 电信科学, 2018 - infocomm-journal.com
… Solution for smart government cloud based on cloud security technology[J]. Telecommunica…
Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer …

物聯網安全機制之研究

SJ Huang - 臺中科技大學資訊工程系碩士班學位論文, 2020 - airitilibrary.com
Via IoT (Internet of Things), devices used in our daily life can communicate with each other.
IoT is also applied to various applications such as industrial automation and eHealth. …

[PDF][PDF] Addressing Security and Computation TS Challenges in IoT Using Machine 醫官Learning

BK Mohanta, U Satapathy, D Jena - researchgate.net
… The IoT system has security challenges like authentication, data privacy, access control, and
… The IoT cloud-based infrastructure case processing and computation are done on cloud …

[PDF][PDF] 物联网认证协议综述

杨婷, 张光华, 刘玲, 张玉清 - Journal of Cryptologic Research, 2020 - jcr.cacrnet.org.cn
Cloud-based lightweight RFID mutual authentication protocol[C]. In: Proceedings of 2017 …
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT …

Chen LQ, Wang J, Liu WW. Weak join for the constraint-based polyhedra abstract domain. J Softw. 2010; 21 (11): 2711–4.(in Chinese)(陈立前, 王戟, 刘万伟. 基于约束 …

DH Jin, YZ Gong, CH Yang - The Fundamental Research for Trustworthy …, 2011 - Springer
… A cloud-based trust model for evaluating quality of web services. J Comput Sci Technol. …
Efficient tag identification in mobile RFID systems. In: Proceedings of the IEEE international …