Improving the security of an RFID delegation protocol
碩士 === 國立中興大學 === 資訊科學與工程學系所 === 100 === Radio Frequency Identification (RFID) tag delegation enables a back-end server to delegate the ability to identify and authenticate a tag to a specified entity, such as a reader. It is used to reduce the tag authentication computational cost on a server. Rece...
Main Authors: | Chien-Cheng Huang, 黃健城 |
---|---|
Other Authors: | 洪國寶 |
Format: | Others |
Language: | zh-TW |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/23059556941741156036 |
Similar Items
-
Controlled Delegation Protocol in Mobile RFID Networks
by: Yung-Ren Tseng, et al.
Published: (2009) -
Delegation Transfer Protocol in Mobile RFID Networks
by: Po-Yu Hsu, et al.
Published: (2011) -
RFID Authentication Protocols with Time Constraint Delegation
by: Zong-Jhih Lin, et al.
Published: (2007) -
Controlled Delegation Protocol in Mobile RFID Networks
by: Yang MingHour
Published: (2010-01-01) -
Controlled Delegation Protocol in Mobile RFID Networks
by: Ming Hour Yang
Published: (2010-01-01)