Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Supply-chain and inventory management are the main areas in the internet of things (IoT) requiring low cost and secure batch mode privacy and authentication of radio frequency identification (RFID) tags. Some additional security and quality of service requirements are also necessary for a secure RFID based supply chain application. In this paper, our contribution is twofold: first, we propose a new...
RFID and WSN technologies are widely used in today's pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. RFID...
We present an information infrastructure in which Agile Virtual Enterprise (AVE) Supported by Fourth Party Logistics (4PL), named 4PL-AVE. At first, the difference between AVE and 4PL is introduced, and then 4PL-AVE model architecture is given that consists of three-dimensional cube of life-cycle dimension, the view model dimension and universal level dimension which complete describe the 4PL-AVE...
Given the security and privacy problems in the application of Radio Frequency Identification(RFID), this paper is proposed a kind of novel security framework, aiming to find a better mechanism in security and privacy problems. It is worth mentioning that this paper draws Agent and Trusted Computing technology into the design of RFID system, whose superiority in authentication is used to solve the...
The paper introduces the structure of the EPC network, analyzes the potential security problems of the EPC network information service (EPCIS). Expatiates the light PKI EPCIS trust model based on PKI, the proposed light PKI trust architecture is much simpler and efficient. Put forward a based on the enterprise trust and collaboration model (ETCM) and the search algorithm of the trust corporate relations...
Radio frequency identification (RFID) is one of the automatic identification technologies more in vogue nowadays. There is a wide research and development in this area trying to take maximum advantage of this technology, and in coming years many new applications and research areas will continue to appear. This sudden interest in RFID also brings about some concerns, mainly the security and privacy...
Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for ubiquitous environment. The RFID market has focused on transponders and reader development. But the features of RFID system and the constraints of RFID devices may bring about various security problems. In this paper, we propose a novel cross-layer architecture designed to...
RFID (radio frequency identification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authentication and protection against tracking of RFID tags without loosing the system scalability, a public-key based approach is inevitable, which is shown by M. Burmester et al. In this paper, we present an architecture of a state-of-the-art...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.