Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash
Search - hash - List
DL : 0
RFID系统的IEEE的文章,安全协议,认证- In this paper, we first propose a cryptographic authentication protocol which meets the privacy protection for tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol which uses cryptographic hash algorithm is based on a three-way challenge response authentication scheme. In addition, we will show how the three different types of protocol frame formats are formed by extending the ISO/IEC 18000-3 standard[3] for implementing the proposed authentication protocol in RFID system environment. The system has been described in Verilog HDL and also synthesized using Synopsys Design Compiler with Hynix 0.25 µ m standard-cell library. From implementation results, we found that the proposed scheme is well suite to implement robust RFID system against active attacks such as the man-in-the-middle attack.
Date : 2025-12-30 Size : 228kb User : fxy

DL : 0
适用于RFID安全认证协议的轻量级hash算法,输出64bit数据。-Applicable to lightweight RFID authentication protocol security hash algorithm, output 64bit data.
Date : 2025-12-30 Size : 2kb User : Peter

本文研究RFID中间件的事件过滤技术,主要工作:(1)综合分析了各RFID事件 过滤算法的性能,着重分析了两种具有代表性的算法并指出其不足和局限。(2)分析了 RFID中间件在实际应用中的性能要求,提出一种更适合于RFID中间件的事件过滤算 法,基于聚合转换和KDB树的事件过滤算法。(3)用仿真实验测试各算法的性能表现, 证明本文的算法提升了RFlD中间件的综合性能。-Event Filtering is the core function of RFID middleware and is hot spot in the research of RFID middleware.Traditional Event Filtering technology rely on a variety of optimization in the database,Can not meet the requirements of RFID middleware.the filtering technology based Oil the memory databases is concern about in current researches,such as a variety of filtering techniques based on the hash table,CQI,vclL R-Tree index have been proposed and applied to the RFID middleware.Them improved the timeliness and reduce the storage space to some extent,but t11ey emphasize unilateral performance but not overall performance because the practical application environment of RFID middleware is not considered III
Date : 2025-12-30 Size : 3.04mb User : HY jian

DL : 0
A Security and Performance Evaluation of Hash-based RFID Protocols
Date : 2025-12-30 Size : 165kb User : 740275789
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.