2018
DOI: 10.4018/978-1-5225-5736-4.ch016
|View full text |Cite
|
Sign up to set email alerts
|

Security of Information Exchange Between Readers and Tags

Abstract: RFID (radio frequency identification) systems tend to be one of the most predominant computing technologies due to their low cost and their broad applicability. Latest technologies have brought costs down, and standards are being developed. Now the RFID technology is very important and essential. It is used for innovative applications in personnel services. RFID technology is based on tags, distance and frequency, communication mode, antenna and power transfer, and communication. The attacks are based on the w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Public/private key pairs are used in a security protocol employed [16]. Every transaction is encrypted using the user's private and public keys, which are connected to the consortium blockchain's administrative node [17].…”
Section: Consortiummentioning
confidence: 99%
“…Public/private key pairs are used in a security protocol employed [16]. Every transaction is encrypted using the user's private and public keys, which are connected to the consortium blockchain's administrative node [17].…”
Section: Consortiummentioning
confidence: 99%