Study on Re-encryption Technology in RFID Security
碩士 === 國立高雄應用科技大學 === 電子工程系 === 97 === wireless communication in order to catch the ability of wireless identification. for example, leaking commercial secrets and ID information, and faking someone's personal information. In a wireless circumstance, RFID is easily caused safety problems by the...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15719946574288916353 |
id |
ndltd-TW-097KUAS8393097 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097KUAS83930972016-04-29T04:19:16Z http://ndltd.ncl.edu.tw/handle/15719946574288916353 Study on Re-encryption Technology in RFID Security 重複加密技術於無線辨識系統安全之研究 Chin-Lin Chang 張志麟 碩士 國立高雄應用科技大學 電子工程系 97 wireless communication in order to catch the ability of wireless identification. for example, leaking commercial secrets and ID information, and faking someone's personal information. In a wireless circumstance, RFID is easily caused safety problems by these attacking, such as eavesdropping and scanning. In this study, I will discuss the proposed RFID security mechanism first, and I find there is still security threats in these RFID security mechanism. Because of that RFID security mechanism needs to be improved. So I propose a security mechanism which is low-cost and can protect privacy and safety. I also aime at this study to bring up a safe analysis about Re-encryption technology and compare with other certificated mechanisms In the result, Re-encryption can repeat named tags and because of that attackers can't track and identify tags .This way can gain the aim of protecting the users' secrets. Maw-Shung Lee 李茂順 2009 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立高雄應用科技大學 === 電子工程系 === 97 === wireless communication in order to catch the ability of wireless identification. for example, leaking commercial secrets and ID information, and faking someone's personal information. In a wireless circumstance, RFID is easily caused safety problems by these attacking, such as eavesdropping and scanning.
In this study, I will discuss the proposed RFID security mechanism first, and I find there is still security threats in these RFID security mechanism. Because of that RFID security mechanism needs to be improved. So I propose a security mechanism which is low-cost and can protect privacy and safety. I also aime at this study to bring up a safe analysis about Re-encryption technology and compare with other certificated mechanisms In the result, Re-encryption can repeat named tags and because of that attackers can't track and identify tags .This way can gain the aim of protecting the users' secrets.
|
author2 |
Maw-Shung Lee |
author_facet |
Maw-Shung Lee Chin-Lin Chang 張志麟 |
author |
Chin-Lin Chang 張志麟 |
spellingShingle |
Chin-Lin Chang 張志麟 Study on Re-encryption Technology in RFID Security |
author_sort |
Chin-Lin Chang |
title |
Study on Re-encryption Technology in RFID Security |
title_short |
Study on Re-encryption Technology in RFID Security |
title_full |
Study on Re-encryption Technology in RFID Security |
title_fullStr |
Study on Re-encryption Technology in RFID Security |
title_full_unstemmed |
Study on Re-encryption Technology in RFID Security |
title_sort |
study on re-encryption technology in rfid security |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/15719946574288916353 |
work_keys_str_mv |
AT chinlinchang studyonreencryptiontechnologyinrfidsecurity AT zhāngzhìlín studyonreencryptiontechnologyinrfidsecurity AT chinlinchang zhòngfùjiāmìjìshùyúwúxiànbiànshíxìtǒngānquánzhīyánjiū AT zhāngzhìlín zhòngfùjiāmìjìshùyúwúxiànbiànshíxìtǒngānquánzhīyánjiū |
_version_ |
1718251094782509056 |