The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
W pracy otrzymano wieloskładnikową ceramikę PZT domieszkowaną chromem, manganem i tantalem. Ceramiczny proszek o składzie Pb(Zr0,70Ti0,30)O3 syntetyzowano metodą zol–żel, a potem domieszkowano tlenkami Cr2O3, MnO2 oraz Ta2O5. Otrzymano dwa składy proszków o stałej ilości tlenków manganu (1,0%) i chromu (0,15%), o różnej zawartości procentowej tlenku tantalu (0,03% i 0,05%). Syntetyzowanie poszczególnych...
Attacks in RFID systems are known to be expressed in output data. As these systems become more widespread, research into detecting attacks in the output data which is produced when RFID components interact will become more important. However, the problem limiting practical research developments in this area has been the availability of output data containing attacks. As the output data is contextualized...
Attacks at the ??RFID layer??, where tags and readers interact, appear in the output data used by the ??strategic layer?? to monitor or authorize entities. Previous research has used contextual information from the ??real world layer?? or ??strategic layer?? for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce...
A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the more traditional approaches of granting an entity access to a particular zone, whereas monitoring systems establish an entity's location in that zone...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.