基于云服务器的RFID 双向认证协议

郑金彬 - 牡丹江大学学报, 2016 - cqvip.com
近年来, 国家大力促进中小企业发展, 其中诸多类似于从事物流供应链管理,
建筑资材管理等业务的中小企业急需无线射频识别(RFID) 技术的应用支持, 为了节省企业开支 …

Formal analysis of a novel RFID authentication protocol

N Chikouche - 2017 8th International Conference on …, 2017 - ieeexplore.ieee.org
One of the most important ubiquitous computing systems that have seen fast evolution
during the last years, we cite radio frequency identification (RFID) system. There are …

Adaptive sensing private property protection protocol based on cloud

K Fan, W Wang, H Li, Y Yang - International Journal of …, 2015 - journals.sagepub.com
Private property refers to something carrying private information, or expensive items; these
items are very important for companies or individuals. The proposed private property …

[PDF][PDF] A survey of Cloud-based Radio-frequency Identification Authentication Protocols and Improvements to One of the Latest Proposed Protocols

H Samimi, TA Tabari, A Moeini - academia.edu
The development of IoT and cloud data storage has enabled several objects to access the
internet through radio-frequency identification (RFID) systems. Currently, the use of the …

iParking: An intelligent android-cloud based smart parking reservation system using smart phones supportive to smart city

A Khadsare, G Jadhav, S Mali… - International Journal of …, 2017 - igi-global.com
Finding a parking in most of the metropolitan areas, especially during the rush hours, is
difficult for drivers nowadays. The iParking system proposed in this paper allows drivers to …

ECC certificate for authentication in cloud-based RFID

E Chaimae, R Rahal - 2016 2nd International Conference on …, 2016 - ieeexplore.ieee.org
Cloud computing is the access via internet to shared resources and services. Merging this
technology with RFID enabled the improvement of the latter such as data storage and …

[PDF][PDF] Research on RFID authentication Protocol in Internet of Vehicles

P Sun, F Li - Sch J Eng Tech, 2021 - saspublishers.com
With the development of Internet of Vehicles, radio frequency identification technology
(RFID) has been widely used in vehicle networks. The classic RFID authentication scheme …

Simulation of an information channel on the IBM 704 computer

EG Newman, LO Nippe - Papers presented at the the March 3-5, 1959 …, 1959 - dl.acm.org
Expressions for the probabilities of multiple error patterns in symbols consisting of N bits are
needed to evaluate the effectiveness of applying error correcting codes to these information …

[PDF][PDF] Trust Management in RFID Critical Applications

ARAH Al-Sudani - 2020 - dro.deakin.edu.au
Trust Management in RFID Critical Applications Page 1 Trust Management in RFID Critical
Applications AUTHOR(S) Ahmed Raad Abdul Hussein Al-Sudani PUBLICATION DATE 01-03-2020 …

An RFID-based Authentication Protocol for IoT Healthcare Environment.

M Shariq, K Singh, M Manjul - Grenze International Journal …, 2020 - search.ebscohost.com
Over the past years, the data related to traditional medical privacy and many other similar
cases are at a serious risk of disclosure by the third party or it may be an adversary or an …