Добірка наукової літератури з теми "Security system RFID Tags"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security system RFID Tags".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Security system RFID Tags"

1

Baashirah, Rania, and Abdelshakour Abuzneid. "Survey on Prominent RFID Authentication Protocols for Passive Tags." Sensors 18, no. 10 (2018): 3584. http://dx.doi.org/10.3390/s18103584.

Повний текст джерела
Анотація:
Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocol
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kumar, Mr K. Vinod. "Improving the Security System for the Vehicle by Using the Driving License and Fingerprint Automation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29633.

Повний текст джерела
Анотація:
In contemporary times, the widespread use of vehicles necessitates robust protection against theft, which is achieved through the integration of RFID tags and fingerprint authentication. This paper introduces a vehicle ignition system that leverages RFID tags and fingerprint recognition to safeguard vehicles from unauthorized access. Authorized RFID tags initiate the authentication process, complemented by fingerprint verification for driver identification. Upon successful authentication, a relay is activated, enabling the ignition system, while a red LED displays the status. In the event of a
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ashok, Akaram Patil. "RFID Tags and Security Mechanism in Library." International Journal of Advance and Applied Research 10, no. 1 (2022): 350 to 355. https://doi.org/10.5281/zenodo.7203842.

Повний текст джерела
Анотація:
This paper presents a methodology of using low-cost RFID tags for a library management system to protect the books from unauthorized capturing and usage. Every object to be identified in the RFID system is physically labeled with a tag. In the proposed method a book or a magazine or a CD is identified with the RFID tag. Whenever a book is issued to any user of the library, the RFID reader will capture the information of that book and compares it with the related information of the book in the Online Public Access Catalogue (OPAC) and issues the book to the user depending on his identity in the
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Pawankumar, Tanavarappu. "A Security Framework in RFID." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 1026–29. https://doi.org/10.5281/zenodo.3854949.

Повний текст джерела
Анотація:
Radio Frequency Identification RFID tags generally belong to a single domain system which is called has RFID single domain system. Till date, most of the researches in the RFID single domain system have been authentication protocol against a variety of attacks. This topic generally describes about the security and privacy mechanism in RFID multi domain which is further divided into three sub topics that is RFID forehand system security, RFID backhand system security and RFID inter domain system security. Pawankumar Tanavarappu "A Security Framework in RFID" Published in International
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sanam, Ezeddin, Kamaruzzaman Seman, M. S. Jawad, Abadal Salam T. Hussain, and Mohd Zalisham Jali. "Impulse-Based UWB for Next Generation Secure and Tunable Short-Range Wireless Infrastructures." Applied Mechanics and Materials 793 (September 2015): 535–40. http://dx.doi.org/10.4028/www.scientific.net/amm.793.535.

Повний текст джерела
Анотація:
There will be increasing demand for high confidentiality, integrity, authentication, for widely deployment of the next RFID generation beside that, the focus will be on avoiding encryption algorithms; as these require more complex modulation, to secure communication between RFID’s tags and readers. In this paper, the focus will be on securing the communication channel between tags and readers at the physical layer, rather than to secure the contents of RFIDs data by encryption. The RFID reader initially will communicate with the tag through a narrowband communication and subsequently through b
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Syahid, Syahid. "Automatic Door Based on Radio Frequency Identification (RFID) and Password in Electrical Engineering Laboratory." JAICT 4, no. 1 (2019): 6. http://dx.doi.org/10.32497/jaict.v4i1.1433.

Повний текст джерела
Анотація:
RFID (Radio Freq uency Identification) systems are used as personal identification cards in the room access system especially in Electrical Engineering Laboratory. This system is intended to maintain the security and privacy of the room from someone who does not have the authority to enter the room. This security system uses a two-tier security system, namely through an RFID identity card and security code. The design and implementation of this system, an electric key work system is evaluated based on the solenoid component and the password used when accessing the room. RFID tags used in this
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Prodanoff, Zornitza Genova, Edward L. Jones, Hongmei Chi, Sherif Elfayoumy, and Cynthia Cummings. "Survey of Security Challenges in NFC and RFID for E-Health Applications." International Journal of E-Health and Medical Communications 7, no. 2 (2016): 1–13. http://dx.doi.org/10.4018/ijehmc.2016040101.

Повний текст джерела
Анотація:
Hospitals worldwide have implemented High Frequency (HF) Radio Frequency Identification (RFID) networks for supplies tracking in ER setting, in-patient identification, surgical instrument management, and other applications. Merging of Web, Near Filed Communication (NFC), and HF RFID technologies for their combined use in e-Health applications is a logical next step due to the wide availability of NFC-enabled smartphones. This article outlines some resulting security challenges. Tags are often compliant with multiple standards that operate in the same frequency range. For example, HF RFID tags
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Tao, Ye, Shou Fu Geng, and Hou Wei Lian. "Dumping Tags Based on Active RFID." Advanced Materials Research 215 (March 2011): 29–32. http://dx.doi.org/10.4028/www.scientific.net/amr.215.29.

Повний текст джерела
Анотація:
In view of the problems that Security personnel who faced with an emergency response can not be timely in the process of duty, we propose and establish a monitoring system based on active RFID technology. The system uses active RFID Reader and the communication protocol between Reader and the host computer to monitor the status of security personnel. Tag’s configuration allows more flexible application of the tag and we can use the configuration to change the parameters of the tag. The tag's size is small and it has flexible applicability and strong adaptability. Test results showed that the t
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ahmad, Muhammad Baballe, and Fatima Alkasim Nababa. "A comparative study on radio frequency identification system and its various applications." International Journal of Advances in Applied Sciences 10, no. 4 (2021): 392. http://dx.doi.org/10.11591/ijaas.v10.i4.pp392-398.

Повний текст джерела
Анотація:
<span>The radio frequency identification (RFID), is a wireless technology system that is used for identifying an individual or objects through the means of radio waves that transfer information from an electronic tag, called an RFID tag. RFID consists of two main components the interrogator and the transponder. The Interrogator, which is the RFID reader, the interrogator usually transmits and receives the signal while the transponder that is the tag, is attached to the object. In the RFID system, an RFID reader interrogates the RFID tags. This tag reader generates a radio frequency inter
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Maulida, Hilda, Ihsan Riga Valendi, Olland Nugraha, and Fadhli Ranuharja. "Sistem Proteksi Brankas Berbasis RFID dan Arduino UNO Menggunakan Metode Prototyping." J-HyTEL: Journal of Hypermedia & Technology-Enhanced Learning 1, no. 2 (2023): 87–94. http://dx.doi.org/10.58536/j-hytel.v1i2.73.

Повний текст джерела
Анотація:
This research focuses on developing a security key control device using RFID and a keypad with a prototyping design method. The goal is to enhance the convenience and security of managing security keys quickly and effectively. The system requires the correct recognition of RFID tags and the entry of the correct password before granting access to the security keys. Stringent security measures are in place, preventing access when incorrect RFID tags or passwords are detected. The prototype device comprises an Arduino UNO as the main controller, a keypad, RFID technology, an LCD, and a servo as t
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Security system RFID Tags"

1

Al-Adhami, Ayad. "A secure quorum based multi-tag RFID system." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12821.

Повний текст джерела
Анотація:
Radio Frequency Identification (RFID) technology has been expanded to be used in different fields that need automatic identifying and verifying of tagged objects without human intervention. RFID technology offers a great advantage in comparison with barcodes by providing accurate information, ease of use and reducing of labour cost. These advantages have been utilised by using passive RFID tags. Although RFID technology can enhance the efficiency of different RFID applications systems, researchers have reported issues regarding the use of RFID technology. These issues are making the technology
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Modaresi, Mahyar. "System and Method for Passive Radiative RFID Tag Positioning in Realtime for both Elevation and Azimuth Directions." Thesis, KTH, Communication Systems, CoS, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24562.

Повний текст джерела
Анотація:
<p>In this thesis, design and realization of a system which enables precise positioning of RFID tags in both azimuth and elevation angles is explained. The positioning is based on measuring the phase difference between four Yagi antennas placed in two arrays. One array is placed in the azimuth plane and the other array is perpendicular to the first array in the elevation plane. The phase difference of the signals received from the antennas in the azimuth array is used to find the position of RFID tag in the horizontal direction. For the position in the vertical direction, the phase difference
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mirowski, L. "Detecting Clone Radio Frequency Identification Tags." Thesis, Honours thesis, University of Tasmania, 2006. https://eprints.utas.edu.au/792/1/Detecting_Clone_Radio_Frequency_Identification_Tags.pdf.

Повний текст джерела
Анотація:
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning, is a serious threat to RFID systems. It can enable an attacker to gain access to a secure facility, make fraudulent purchases, or disrupt supply chains. It may even enable crimes like financial gain, people smuggling, and drug trafficking, terrorism and money laundering. Presently there is no practical solution to defend against tag cloning. This thesis details research that aims to detect the presence of clone tags which may be the first step in defending against them and preventing RFID-
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Abdelmalek, Omar. "Conception et prototypage d'architectures robustes de tags RFID UHF." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAT088/document.

Повний текст джерела
Анотація:
Les systèmes RFID sont de plus en plus utilisés dans des applications critiques fonctionnant dans des environnements perturbés (ferroviaire, aéronautique, chaînes de production ou agroalimentaire) ou dans des applications où la sécurité est essentielle (identification, lutte contre la contrefaçon). Pourtant, ces systèmes faibles coûts, initialement conçus pour des applications de masse non critiques, sont peu robustes par nature. Pour les applications critiques, les défaillances des puces RFID peuvent avoir des conséquences catastrophiques ou créer des failles de sécurité importantes. Ces défa
Стилі APA, Harvard, Vancouver, ISO та ін.
5

CAIZZONE, STEFANO. "Sensing and communication potentialities of coupled RFID tags." Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2014. http://hdl.handle.net/2108/203634.

Повний текст джерела
Анотація:
The upcoming Internet of Things is realizing the vision of a fully connected world: one of the key enablers for such technological revolution is the development of low-cost long-lasting sensors, able to become the physical interface to the real-world. In such a quest, the Radio Frequency Identication (RFID) is establishing itself as the most promising technology for passive sensing, thanks to its standardized communication protocol and its massive use in nowaday's logistics, which has driven down the costs of commercial components. The extensive research eort of the latest years on the
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mughal, Aiman. "Statistical analysis of the coupling effects between tags in the RFID links." Electronic Thesis or Diss., Université Gustave Eiffel, 2024. http://www.theses.fr/2024UEFL2002.

Повний текст джерела
Анотація:
Différentes études empiriques montrent que l'effet du couplage mutuel et la position et l'orientation aléatoires des antennes tags dans un volume réduit entraînent une dégradation des indicateurs de performance d'un système RFID, tels que la distance et le taux de lecture. Cette thèse participe à l'analyse des performances d'un tel système RFID en explorant les phénomènes physiques à l'origine de la dégradation et en introduisant des techniques statistiques dans les investigations. Avant de procéder à l'étude du comportement de groupe, la sensibilité et l'impédance de deux puces RFID (Higgs-3
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zancanaro, Mario Antônio. "Identification des éléments RFID mobiles dans les environnements intérieurs associant la couche application et la couche physique." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066730.

Повний текст джерела
Анотація:
Les recherches autours la localisation d’étiquettes RFID dans des environnements intérieurs (indoor) ont suggéré plusieurs algorithmes et techniques. Identifier des étiquettes RFID dans les environnements intérieurs avec une parfaite précision n’est pas une tâche facile pour de nombreuses applications dans l'industrie, les supermarchés ou encore dans la logistique. Les systèmes de localisation RFID ont évolué en raison de l’augmentation de la popularité des applications qui nécessitent ce type de ressource. En effet, de nombreux procédés ont manifesté le besoin d'identifier et de localiser des
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Holland, William S. "Development of an Indoor Real-time Localization System Using Passive RFID Tags and Artificial Neural Networks." Ohio University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1249062541.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zancanaro, Mario Antônio. "Identification des éléments RFID mobiles dans les environnements intérieurs associant la couche application et la couche physique." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066730.

Повний текст джерела
Анотація:
Les recherches autours la localisation d’étiquettes RFID dans des environnements intérieurs (indoor) ont suggéré plusieurs algorithmes et techniques. Identifier des étiquettes RFID dans les environnements intérieurs avec une parfaite précision n’est pas une tâche facile pour de nombreuses applications dans l'industrie, les supermarchés ou encore dans la logistique. Les systèmes de localisation RFID ont évolué en raison de l’augmentation de la popularité des applications qui nécessitent ce type de ressource. En effet, de nombreux procédés ont manifesté le besoin d'identifier et de localiser des
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Rohatgi, Anil. "Implementation and Applications of an Anti-Collision Differential-Offset Spread Spectrum RFID System." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/13946.

Повний текст джерела
Анотація:
This report documents the design, construction, and implementation of a differential-offset spread spectrum RFID system, to avoid the problem of anti-collision interference from multiple RFID tags. Currently in industry, this problem is handled by establishing a two way communication link between the tags and the interrogator. The proposed system eliminates the need for the excessive hardware use to create this link, and therefore drastically reduces the cost of each tag. Not only is this system cheaper to implement but it is faster, requires less power, and by the nature of the design contai
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Книги з теми "Security system RFID Tags"

1

Lopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Information Science Reference, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Yan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Springer-Verlag US, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

United States. Department of Homeland Security. Office of Inspector General. Office of Information Technology. Enhanced security controls needed for US-VISIT's system using RFID technology. Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

United States. Department of Homeland Security. Office of Inspector General. Office of Information Technology. Letter report: TSA's development of its weapons management system using RFID. Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zhang, Yan, and Paris Kitsos. RFID Security: Techniques, Protocols and System-On-Chip Design. Springer, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Security system RFID Tags"

1

Abughazalah, Sarah, Konstantinos Markantonakis, and Keith Mayes. "A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags." In Security and Privacy Protection in Information Processing Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Rekleitis, Evangelos, Panagiotis Rizomiliotis, and Stefanos Gritzalis. "An Agent Based Back-End RFID Tag Management System." In Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15152-1_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zhu, Dali, Wenjing Rong, Di Wu, and Na Pang. "Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System." In Information and Communications Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89500-0_31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Di, Jia, and Dale R. Thompson. "Security for RFID Tags." In Introduction to Hardware Security and Trust. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-8080-9_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Batina, Lejla, Jorge Guajardo, Bart Preneel, Pim Tuyls, and Ingrid Verbauwhede. "Public-Key Cryptography for RFID Tags and Applications." In RFID Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-76481-8_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Lee, Kijeong, Byungjoo Park, and Gil-Cheol Park. "Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13365-7_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Solanas, Agusti, and Jesús Manjón. "RFID Readers Deployment for Scalable Identification of Private Tags." In RFID Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-76481-8_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Malek, Behzad, and Ali Miri. "Private Identification of RFID Tags." In Foundations and Practice of Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27901-0_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Wu, Chuan-Kun. "RFID System Security." In Internet of Things Security. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Han, Dong-Guk, Tsuyoshi Takagi, Ho Won Kim, and Kyo Il Chung. "New Security Problem in RFID Systems “Tag Killing”." In Computational Science and Its Applications - ICCSA 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751595_41.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Security system RFID Tags"

1

Asci, Cihan, Wei Wang, and Sameer Sonkusale. "Security Monitoring System Using Magnetically-Activated RFID Tags." In 2020 IEEE SENSORS. IEEE, 2020. http://dx.doi.org/10.1109/sensors47125.2020.9278750.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chavan, Kaushik, Abe Zeid, and Sagar Kamarthi. "New Approaches for Better Security and Privacy in RFID Communications." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-34943.

Повний текст джерела
Анотація:
RFID is likely to emerge as a very important tool in electronically documenting the physical world to generate powerful information. In order to label millions of objects with RFID tags economically, the cost of a single tag has to be very competitive. However an inexpensive tag costing just a few cents would not have the necessary infrastructure to secure the data it stores and transmits. RFID has been drawing attention from privacy advocates and skeptics for the loopholes it can create in the information security infrastructure and consumer privacy. This article presents an overview of the s
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wenger, Erich, Thomas Baier, and Johannes Feichtner. "JAAVR: Introducing the Next Generation of Security-Enabled RFID Tags." In 2012 15th Euromicro Conference on Digital System Design (DSD). IEEE, 2012. http://dx.doi.org/10.1109/dsd.2012.81.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sowmiya, M., and R. S. Sabeenian. "Security and monitoring system by using RFID tags and multiple sensors." In 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE). IEEE, 2017. http://dx.doi.org/10.1109/iceice.2017.8191945.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Couto, Christiana, Gabriela Moutinho de Souza Dias, Ronaldo Moreira Salles, and Gustavo Claudio Karl Couto. "A Scalable and Secure Protocol for RFID Based on “Advanced Encryption Standard” and Elliptic Curve Cryptography." In Simpósio Brasileiro de Computação Ubíqua e Pervasiva. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbcup.2022.222771.

Повний текст джерела
Анотація:
Radio frequency identification systems are widely used to uniquely identify objects in many applications such as magnetic cards, security tags, and logistic management systems. Despite these advantages provided by the RFID system, there remain a multitude of security concerns related to spoofing and espionage that are all concerned with radio frequency interception. Current research analysis is promising, particularly the work of Ibrahim and Dalkiliç. Their findings are, however, limited by the amount of tags that can be processed—which under certain circumstances can exhaust the server. We de
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Tsai, Hanchung, Yung Y. Liu, and James Shuler. "RFID Technology for Environmental Remediation and Radioactive Waste Management." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40218.

Повний текст джерела
Анотація:
An advanced Radio Frequency Identification (RFID) system capable of tracking and monitoring a wide range of materials and components—from fissionable stocks to radioactive wastes—has been developed. The system offers a number of advantages, including enhanced safety, security and safeguards, reduced personnel exposure to radiation, and improved inventory control and cost-effectiveness. Using sensors, RFID tags can monitor the state of health of the tracked items and trigger alarms instantly when the normal ranges are violated. Nonvolatile memories in the tags can store sensor data, event recor
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Khalid, Madiha, and Umar Mujahid. "Security framework of Ultralightweight Mutual Authentication Protocols for low cost RFID tags." In 2017 International Conference on Communication, Computing and Digital Systems (C-CODE). IEEE, 2017. http://dx.doi.org/10.1109/c-code.2017.7918896.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ertl, Johann, Thomas Plos, Martin Feldhofer, Norbert Felber, and Luca Henzen. "A Security-Enhanced UHF RFID Tag Chip." In 2013 Euromicro Conference on Digital System Design (DSD). IEEE, 2013. http://dx.doi.org/10.1109/dsd.2013.80.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Bilal, Zeeshan, Ashraf Masood, and Firdous Kausar. "Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol." In 2009 International Conference on Network-Based Information Systems (NBIS). IEEE, 2009. http://dx.doi.org/10.1109/nbis.2009.9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Abawajy, Jemal. "Enhancing RFID Tag Resistance against Cloning Attack." In 2009 Third International Conference on Network and System Security. IEEE, 2009. http://dx.doi.org/10.1109/nss.2009.101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Security system RFID Tags"

1

Bloch, G., and H. S. Woodard. regulation of size related division of labor in a key pollinator and its impact on crop pollination efficacy. United States-Israel Binational Agricultural Research and Development Fund, 2021. http://dx.doi.org/10.32747/2021.8134168.bard.

Повний текст джерела
Анотація:
Despite the rapid increase in reliance on bumble bees for food production and security, there are many critical knowledge gaps in our understanding of bumble bee biology that limit their colony production, commercial management, and pollination services. Our project focuses on the social, endocrine, and molecular processes regulating body size in the two bumble bee species most important to agriculture: Bombus terrestris in Israel, and B. impatiens in the USA. Variation in body size underline both caste (queen/worker) differentiation and division of labor among workers (foragers are typically
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!