English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90120/105278 (86%)
Visitors : 8849302      Online Users : 608
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/4054

    Title: A study on RFID authentication protocol and its application on the medical records
    Authors: Wei-Lin Wang
    Contributors: Department of Computer Science and Information Engineering
    Keywords: RFID;security;private;authentication;protocol
    Date: 2006
    Issue Date: 2009-11-18 21:13:45 (UTC+8)
    Publisher: Asia University
    Abstract: RFID (Radio Frequency Identification) is one of the most promising NFC (Near Field Communication) communication technologies for ubiquitous network societies in recent year as RFID tag not only features identification、renewable and reusable but also high security that has been increasing its applications in the markets, including supply chain、retail、transportation、security、electronic toll system、library management system and healthcare. Our daily life would therefore be more convenient due to such applications mentioned early on. However, security and privacy will be an issue while RFID has become part of our daily life. Researchers have put out a warning about it as RFID tag would instantly callback ID once RFID tag received a signal from any RFID Reader. They have therefore proposed some authentication protocols to protect RFID tags from being eavesdropped and replaying attacked. The most straight way of reading RFID tag ID for a general unprotected RFID system is to ask tags recall ID immediately. This kind of tags design would be simpler, the number of tags read per second would be larger and its costs would be lower. On the other hand, RFID tags with the protection of authentication protocol design would be more complex, smaller number tags read per second and higher costs as a result. In this thesis, we propose a new way of authentication protocol in comparison with the others related to the efficiency and security.
    Appears in Collections:[資訊工程學系] 博碩士論文

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback