The Study of RFID Authentication Scheme-Under The Insecure Wireless Environment

碩士 === 中國文化大學 === 資訊管理學系 === 103 === From the literature, it is known that Yeh et al. has improved Chen et al.’s authenti-cation scheme so that it can resist against attacks like impersonation attack, location privacy and replay attack. However, transmitting data in a wireless way is very popular to...

Full description

Bibliographic Details
Main Authors: Chen, Ching-Jen, 陳敬壬
Other Authors: Wang, Mei-Tzu
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/hw9n4x