搜索结果: 1-15 共查到“RFID”相关记录422条 . 查询时间(0.14 秒)
中国科学院昆明动物研究所专利:一种基于RFID的样本保存装置
中国科学院昆明动物研究所 专利 RFID 样本保存装置
2024/6/28
中国科学院深圳先进技术研究院专利:RFID物流管理系统
中国科学院深圳先进技术研究院 专利 RFID 物流管理系统
2023/11/27
如果RFID芯片变成纱线或将颠覆服装业
RFID芯片 纱线 服装业
2020/9/15
服装的标签使用RFID技术已经普及了十年以上,但如果是把电子零组件织进衣服的纤维里、而且还能丢进洗衣机洗呢?有一家总部位于法国格勒诺布尔(Grenoble)的新创公司Primo1D正在开发这样的技术。
On Designing Lightweight RFID Protocols for Medical IoT
RFID Authentication Ultralightweight
2019/7/23
Recently, in IEEE Transactions on Industrial Informatics, Fan et al. proposed a lightweight RFID protocol which has been suggested to be employed for protecting the Medical Privacy in an IoT system. H...
Privacy of Stateful RFID Systems with Constant Tag Identifiers
RFID scheme security privacy
2019/7/18
There is a major interest in designing RFID schemes based on symmetric-key cryptography and ensuring efficient tag identification. These requirements taken together often lead to a decrease in the deg...
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
RFID scheme PUF authentication
2019/2/27
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. No RFID scheme is known so far to meet t...
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
RFID scheme security privacy
2019/1/26
With the large scale adoption of the Radio Frequency Identification (RFID) technology, a variety of security and privacy risks need to be addressed. Arguably, the most general and used RFID security a...
在标签生命周期中,归属权应随着所属者的改变而变化,为保障归属权无误及存放信息的安全,提出一种基于按位运算的标签所有权转移协议。所提协议具备如下特征:对传送信息,采用字合成运算、交叉位运算加密;字合成及交叉位运算均属于超轻量级的计算,能一定程度上降低计算量;共享密钥作为加密的变量,能减少参数的引入,降低存储空间;引入归属权标志位,明确归属权所属者。对协议进行安全性及性能分析,表明协议具备系统所需的安...
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
RFID IoT Secret disclosure
2018/5/2
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et ...
Nowadays, RFID systems have earned an important place in our everyday lives. Its adoption is growing in areas where data security or privacy or both must be guaranteed. Since the RFID tag can be clone...
基于库存错放的供应链RFID投资均衡策略
RFID 库存错放 Stackelberg博弈 均衡策略
2018/2/7
本文以单制造商和双寡头竞争零售商组成的分散决策供应链为研究对象,基于零售商是否投资无线射频识别(radio frequency identification,RFID)技术,分别构建了链上成员不投资RFID (N情景)、零售商1投资RFID (L情景),零售商2投资RFID (F情景),及链上成员均投资RFID (T情景)的收益模型,求解出相应的最优解并探讨链上成员RFID的投资均衡策略.研究发现...
分销网络RFID使能的CONWIP策略的仿真与优化
射频识别 分销网络 基于仿真的优化 和声搜索算法
2018/2/7
为了改善供应链分销网络的性能,本文将射频识别(RFID)技术应用到供应链管理中.依据单工厂多阶段生产过程中定量在制品法(CONWIP)控制策略的原理,设计了RFID使能的电子流通卡系统,实现了供应链分销网络RFID使能的CONWIP控制策略,并采用基于仿真的自适应全局最优和声搜索算法(SGHS)对策略中的参数进行优化,优化结果证明了SGHS方法的可行性,并通过与其它控制策略的仿真结果对比,验证了R...
On the security of another CRC based ultralightweight RFID authentication protocol
RFID EPC-C1G2 Cyclic Redundancy Code
2017/11/1
Design of ultra-lightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. have p...