Cargando…

Radio-frequency identification (RFID) : emerging technologies, applications and improvement strategies /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Fan, Xinxin (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hauppauge, N.Y. : Nova Science Publishers, Incorporated, 2014.
Colección:Media and communications-- technologies, policies and challenges.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: DESIGN AND APPLICATION OF RFID TECHNOLOGY IN THE CONTAINER TRANSPORT SYSTEM; Abstract; Introduction; Components, Working Principle and Workflow of RFID System; Design of RFID System in Container Terminal; Electronic Tags System Construction, Application and Evaluation in Container Port Based on RFID Technology.
  • Evaluation of RFID Electronic Label System Application in Container TransportationRFID Application Analyses in Container Port; References; Chapter 2: RFID TECHNOLOGY FOR DRUG LABELLING IN THE EMERGENCY DEPARTMENT: RFID TO MINIMISE THE OCCURRENCE OF ADVERSE EVENTS; Abstract; Introduction; Methods; Configurable Parameters of the RFID Labels; Requirements of the Selected RFID Label; Discussion; Acknowledgments; References; Chapter 3: APPLICATIONS OF RFID TECHNOLOGY IN THE CONSTRUCTION INDUSTRY: AN ACADEMIC LITERATURE REVIEW; Abstract; Introduction; RFID Technology: An Overview.
  • Practical Issues Associated with the Use of RFID in ConstructionConclusion; References; Chapter 4: SOFTWARE DEFINED RADIO, GNU RADIO, RFID AND THEIR APPLICATIONS; Abstract; 1. Introduction; 2. Need for SDR; 3. Evolution of SDR; 4. SPEAKeasy; 5. GNU Radio; 6. Universal Software Radio Peripheral (USRP); 7. RFID Architecture; 8. USRP for Emulating an RFID Reader; References; Chapter 5: ASPECTS OF RFID SECURITIES; Abstract; 1. Introduction; 2. Overview of Security of EPCglobal Class 1 Gen 2 UHF Tags; 3. RFID Attacks and Countermeasures; Conclusion; References.
  • Chapter 6: LIGHTWEIGHT CRYPTOGRAPHY FOR PASSIVE RFID SYSTEMS: A RESEARCH SURVEYAbstract; 1. Introduction; 2. Lightweight Block Ciphers; 3. Lightweight Stream Ciphers; 4. Lightweight (Pseudo)Random Number Generators; Conclusion; References; Chapter 7: LOW-COMPLEXITY ATTACKS ON SELECTED LIGHTWEIGHT STREAM CIPHERS; Abstract; 1. Introduction; 2. Crypto-1; 3. Hitag-2 Cipher; 4. The Atmel Cipher; 5. A2U2: A Lightweight Stream Cipher for RFID Tags; 6. Conclusion; References; Chapter 8: GROUPING PROOF PROTOCOLS BASED ON LOW-COST RFID TAGS; Abstract; 1. Introduction; 2. RelatedWork.
  • 3. The Proposed Protocols4. Security Analysis and Performance Evaluation; Conclusion; Acknowledgment; References; Chapter 9: SIDE-CHANNEL ATTACKS ON RFID SYSTEMS
  • STATE OF THE ART; Abstract; 1. Introduction; 2. Operation Principle of Passive RFID Systems; 3. Side-Channel Attacks; 4. Tools for Side-Channel Attacks on RFID Systems; 5. A Framework for Side-Channel Attacks on RFID Systems; 6. Side-Channel Attacks on RFID Systems in Practice; Conclusion; References; INDEX.