Two Layered Embedded Encryption for Multiple Frequency RFID Tags

Article Preview

Abstract:

Radio Frequency Identification (RFID) is an automatic identification system. The data storage and retrieval on special devices are carried by RFID tags or transponders. RFID tag applications include enterprise supply chain management to improve the efficiency of inventory tracking and management. These replace bar codes and other low cost remote sensors earlier in use.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

83-87

Citation:

Online since:

October 2011

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Tony Seideman, Barcodes Sweep the World, Wonders of Modern Technology. (2003).

Google Scholar

[2] Waldner, Jean-Baptiste (2008). Nanocomputers and Swarm Intelligence. London: ISTE John Wiley & Sons. p.205–214. ISBN 1847040020.

Google Scholar

[3] Juels, A.,   RFID security and privacy: a research survey - IEEE Journal on Selected Areas in Communications, Volume: 24 Issue: 2 ; Feb. (2006).

DOI: 10.1109/jsac.2005.861395

Google Scholar

[4] Imran Erguler, Emin Anarim, and Gokay Saldamli, A Salient Missing Link in RFID Security Protocols, EURASIP Journal on Wireless Communications and Networking, vol. 2011, Article ID 541283, 9 pages, 2011. doi: 10. 1155/2011/541283.

DOI: 10.1155/2011/541283

Google Scholar

[5] http: /www. axcessinc. com/knowledge/whitepapers/ActiveRFID. pdf.

Google Scholar

[6] Mercer et al. US Patent no: US 7, 372, 364 B2, May 13, (2008).

Google Scholar

[7] http: /focus. ti. com/lit/ds/symlink/trf7960. pdf.

Google Scholar

[8] Syed Hason & Mohammad Ilyas , RFID HANDBOOK Applications, Technology, Security, and Privacy, – CRC Press (2008).

Google Scholar