Radio-frequency identification (RFID) : emerging technologies, applications and improvement strategies /
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hauppauge, N.Y. :
Nova Science Publishers, Incorporated,
2014.
|
Colección: | Media and communications-- technologies, policies and challenges.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: DESIGN AND APPLICATION OF RFID TECHNOLOGY IN THE CONTAINER TRANSPORT SYSTEM; Abstract; Introduction; Components, Working Principle and Workflow of RFID System; Design of RFID System in Container Terminal; Electronic Tags System Construction, Application and Evaluation in Container Port Based on RFID Technology.
- Evaluation of RFID Electronic Label System Application in Container TransportationRFID Application Analyses in Container Port; References; Chapter 2: RFID TECHNOLOGY FOR DRUG LABELLING IN THE EMERGENCY DEPARTMENT: RFID TO MINIMISE THE OCCURRENCE OF ADVERSE EVENTS; Abstract; Introduction; Methods; Configurable Parameters of the RFID Labels; Requirements of the Selected RFID Label; Discussion; Acknowledgments; References; Chapter 3: APPLICATIONS OF RFID TECHNOLOGY IN THE CONSTRUCTION INDUSTRY: AN ACADEMIC LITERATURE REVIEW; Abstract; Introduction; RFID Technology: An Overview.
- Practical Issues Associated with the Use of RFID in ConstructionConclusion; References; Chapter 4: SOFTWARE DEFINED RADIO, GNU RADIO, RFID AND THEIR APPLICATIONS; Abstract; 1. Introduction; 2. Need for SDR; 3. Evolution of SDR; 4. SPEAKeasy; 5. GNU Radio; 6. Universal Software Radio Peripheral (USRP); 7. RFID Architecture; 8. USRP for Emulating an RFID Reader; References; Chapter 5: ASPECTS OF RFID SECURITIES; Abstract; 1. Introduction; 2. Overview of Security of EPCglobal Class 1 Gen 2 UHF Tags; 3. RFID Attacks and Countermeasures; Conclusion; References.
- Chapter 6: LIGHTWEIGHT CRYPTOGRAPHY FOR PASSIVE RFID SYSTEMS: A RESEARCH SURVEYAbstract; 1. Introduction; 2. Lightweight Block Ciphers; 3. Lightweight Stream Ciphers; 4. Lightweight (Pseudo)Random Number Generators; Conclusion; References; Chapter 7: LOW-COMPLEXITY ATTACKS ON SELECTED LIGHTWEIGHT STREAM CIPHERS; Abstract; 1. Introduction; 2. Crypto-1; 3. Hitag-2 Cipher; 4. The Atmel Cipher; 5. A2U2: A Lightweight Stream Cipher for RFID Tags; 6. Conclusion; References; Chapter 8: GROUPING PROOF PROTOCOLS BASED ON LOW-COST RFID TAGS; Abstract; 1. Introduction; 2. RelatedWork.
- 3. The Proposed Protocols4. Security Analysis and Performance Evaluation; Conclusion; Acknowledgment; References; Chapter 9: SIDE-CHANNEL ATTACKS ON RFID SYSTEMS
- STATE OF THE ART; Abstract; 1. Introduction; 2. Operation Principle of Passive RFID Systems; 3. Side-Channel Attacks; 4. Tools for Side-Channel Attacks on RFID Systems; 5. A Framework for Side-Channel Attacks on RFID Systems; 6. Side-Channel Attacks on RFID Systems in Practice; Conclusion; References; INDEX.