Добірка наукової літератури з теми "Security system RFID Tags"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security system RFID Tags".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security system RFID Tags"
Baashirah, Rania, and Abdelshakour Abuzneid. "Survey on Prominent RFID Authentication Protocols for Passive Tags." Sensors 18, no. 10 (2018): 3584. http://dx.doi.org/10.3390/s18103584.
Повний текст джерелаKumar, Mr K. Vinod. "Improving the Security System for the Vehicle by Using the Driving License and Fingerprint Automation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29633.
Повний текст джерелаAshok, Akaram Patil. "RFID Tags and Security Mechanism in Library." International Journal of Advance and Applied Research 10, no. 1 (2022): 350 to 355. https://doi.org/10.5281/zenodo.7203842.
Повний текст джерелаPawankumar, Tanavarappu. "A Security Framework in RFID." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 1026–29. https://doi.org/10.5281/zenodo.3854949.
Повний текст джерелаSanam, Ezeddin, Kamaruzzaman Seman, M. S. Jawad, Abadal Salam T. Hussain, and Mohd Zalisham Jali. "Impulse-Based UWB for Next Generation Secure and Tunable Short-Range Wireless Infrastructures." Applied Mechanics and Materials 793 (September 2015): 535–40. http://dx.doi.org/10.4028/www.scientific.net/amm.793.535.
Повний текст джерелаSyahid, Syahid. "Automatic Door Based on Radio Frequency Identification (RFID) and Password in Electrical Engineering Laboratory." JAICT 4, no. 1 (2019): 6. http://dx.doi.org/10.32497/jaict.v4i1.1433.
Повний текст джерелаProdanoff, Zornitza Genova, Edward L. Jones, Hongmei Chi, Sherif Elfayoumy, and Cynthia Cummings. "Survey of Security Challenges in NFC and RFID for E-Health Applications." International Journal of E-Health and Medical Communications 7, no. 2 (2016): 1–13. http://dx.doi.org/10.4018/ijehmc.2016040101.
Повний текст джерелаTao, Ye, Shou Fu Geng, and Hou Wei Lian. "Dumping Tags Based on Active RFID." Advanced Materials Research 215 (March 2011): 29–32. http://dx.doi.org/10.4028/www.scientific.net/amr.215.29.
Повний текст джерелаAhmad, Muhammad Baballe, and Fatima Alkasim Nababa. "A comparative study on radio frequency identification system and its various applications." International Journal of Advances in Applied Sciences 10, no. 4 (2021): 392. http://dx.doi.org/10.11591/ijaas.v10.i4.pp392-398.
Повний текст джерелаMaulida, Hilda, Ihsan Riga Valendi, Olland Nugraha, and Fadhli Ranuharja. "Sistem Proteksi Brankas Berbasis RFID dan Arduino UNO Menggunakan Metode Prototyping." J-HyTEL: Journal of Hypermedia & Technology-Enhanced Learning 1, no. 2 (2023): 87–94. http://dx.doi.org/10.58536/j-hytel.v1i2.73.
Повний текст джерелаДисертації з теми "Security system RFID Tags"
Al-Adhami, Ayad. "A secure quorum based multi-tag RFID system." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12821.
Повний текст джерелаModaresi, Mahyar. "System and Method for Passive Radiative RFID Tag Positioning in Realtime for both Elevation and Azimuth Directions." Thesis, KTH, Communication Systems, CoS, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24562.
Повний текст джерелаMirowski, L. "Detecting Clone Radio Frequency Identification Tags." Thesis, Honours thesis, University of Tasmania, 2006. https://eprints.utas.edu.au/792/1/Detecting_Clone_Radio_Frequency_Identification_Tags.pdf.
Повний текст джерелаAbdelmalek, Omar. "Conception et prototypage d'architectures robustes de tags RFID UHF." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAT088/document.
Повний текст джерелаCAIZZONE, STEFANO. "Sensing and communication potentialities of coupled RFID tags." Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2014. http://hdl.handle.net/2108/203634.
Повний текст джерелаMughal, Aiman. "Statistical analysis of the coupling effects between tags in the RFID links." Electronic Thesis or Diss., Université Gustave Eiffel, 2024. http://www.theses.fr/2024UEFL2002.
Повний текст джерелаZancanaro, Mario Antônio. "Identification des éléments RFID mobiles dans les environnements intérieurs associant la couche application et la couche physique." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066730.
Повний текст джерелаHolland, William S. "Development of an Indoor Real-time Localization System Using Passive RFID Tags and Artificial Neural Networks." Ohio University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1249062541.
Повний текст джерелаZancanaro, Mario Antônio. "Identification des éléments RFID mobiles dans les environnements intérieurs associant la couche application et la couche physique." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066730.
Повний текст джерелаRohatgi, Anil. "Implementation and Applications of an Anti-Collision Differential-Offset Spread Spectrum RFID System." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/13946.
Повний текст джерелаКниги з теми "Security system RFID Tags"
Lopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Information Science Reference, 2013.
Знайти повний текст джерелаYan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Springer-Verlag US, 2009.
Знайти повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. Office of Information Technology. Enhanced security controls needed for US-VISIT's system using RFID technology. Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2006.
Знайти повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. Office of Information Technology. Letter report: TSA's development of its weapons management system using RFID. Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2006.
Знайти повний текст джерелаZhang, Yan, and Paris Kitsos. RFID Security: Techniques, Protocols and System-On-Chip Design. Springer, 2010.
Знайти повний текст джерелаЧастини книг з теми "Security system RFID Tags"
Abughazalah, Sarah, Konstantinos Markantonakis, and Keith Mayes. "A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags." In Security and Privacy Protection in Information Processing Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_8.
Повний текст джерелаRekleitis, Evangelos, Panagiotis Rizomiliotis, and Stefanos Gritzalis. "An Agent Based Back-End RFID Tag Management System." In Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15152-1_15.
Повний текст джерелаZhu, Dali, Wenjing Rong, Di Wu, and Na Pang. "Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System." In Information and Communications Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89500-0_31.
Повний текст джерелаDi, Jia, and Dale R. Thompson. "Security for RFID Tags." In Introduction to Hardware Security and Trust. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-8080-9_12.
Повний текст джерелаBatina, Lejla, Jorge Guajardo, Bart Preneel, Pim Tuyls, and Ingrid Verbauwhede. "Public-Key Cryptography for RFID Tags and Applications." In RFID Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-76481-8_13.
Повний текст джерелаLee, Kijeong, Byungjoo Park, and Gil-Cheol Park. "Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13365-7_7.
Повний текст джерелаSolanas, Agusti, and Jesús Manjón. "RFID Readers Deployment for Scalable Identification of Private Tags." In RFID Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-76481-8_12.
Повний текст джерелаMalek, Behzad, and Ali Miri. "Private Identification of RFID Tags." In Foundations and Practice of Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27901-0_5.
Повний текст джерелаWu, Chuan-Kun. "RFID System Security." In Internet of Things Security. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_10.
Повний текст джерелаHan, Dong-Guk, Tsuyoshi Takagi, Ho Won Kim, and Kyo Il Chung. "New Security Problem in RFID Systems “Tag Killing”." In Computational Science and Its Applications - ICCSA 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751595_41.
Повний текст джерелаТези доповідей конференцій з теми "Security system RFID Tags"
Asci, Cihan, Wei Wang, and Sameer Sonkusale. "Security Monitoring System Using Magnetically-Activated RFID Tags." In 2020 IEEE SENSORS. IEEE, 2020. http://dx.doi.org/10.1109/sensors47125.2020.9278750.
Повний текст джерелаChavan, Kaushik, Abe Zeid, and Sagar Kamarthi. "New Approaches for Better Security and Privacy in RFID Communications." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-34943.
Повний текст джерелаWenger, Erich, Thomas Baier, and Johannes Feichtner. "JAAVR: Introducing the Next Generation of Security-Enabled RFID Tags." In 2012 15th Euromicro Conference on Digital System Design (DSD). IEEE, 2012. http://dx.doi.org/10.1109/dsd.2012.81.
Повний текст джерелаSowmiya, M., and R. S. Sabeenian. "Security and monitoring system by using RFID tags and multiple sensors." In 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE). IEEE, 2017. http://dx.doi.org/10.1109/iceice.2017.8191945.
Повний текст джерелаCouto, Christiana, Gabriela Moutinho de Souza Dias, Ronaldo Moreira Salles, and Gustavo Claudio Karl Couto. "A Scalable and Secure Protocol for RFID Based on “Advanced Encryption Standard” and Elliptic Curve Cryptography." In Simpósio Brasileiro de Computação Ubíqua e Pervasiva. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbcup.2022.222771.
Повний текст джерелаTsai, Hanchung, Yung Y. Liu, and James Shuler. "RFID Technology for Environmental Remediation and Radioactive Waste Management." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40218.
Повний текст джерелаKhalid, Madiha, and Umar Mujahid. "Security framework of Ultralightweight Mutual Authentication Protocols for low cost RFID tags." In 2017 International Conference on Communication, Computing and Digital Systems (C-CODE). IEEE, 2017. http://dx.doi.org/10.1109/c-code.2017.7918896.
Повний текст джерелаErtl, Johann, Thomas Plos, Martin Feldhofer, Norbert Felber, and Luca Henzen. "A Security-Enhanced UHF RFID Tag Chip." In 2013 Euromicro Conference on Digital System Design (DSD). IEEE, 2013. http://dx.doi.org/10.1109/dsd.2013.80.
Повний текст джерелаBilal, Zeeshan, Ashraf Masood, and Firdous Kausar. "Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol." In 2009 International Conference on Network-Based Information Systems (NBIS). IEEE, 2009. http://dx.doi.org/10.1109/nbis.2009.9.
Повний текст джерелаAbawajy, Jemal. "Enhancing RFID Tag Resistance against Cloning Attack." In 2009 Third International Conference on Network and System Security. IEEE, 2009. http://dx.doi.org/10.1109/nss.2009.101.
Повний текст джерелаЗвіти організацій з теми "Security system RFID Tags"
Bloch, G., and H. S. Woodard. regulation of size related division of labor in a key pollinator and its impact on crop pollination efficacy. United States-Israel Binational Agricultural Research and Development Fund, 2021. http://dx.doi.org/10.32747/2021.8134168.bard.
Повний текст джерела