Now showing items 1-4 of 4

  • Cloning Prevention Protocol for RFID 

    Shah, Jignasa (2010-12-16)
    Radio Frequency Identification (RFID) is an emerging area under ubiquitous computing. RFID benefits include multiple read/write, longer read range and no requirement for line of sight. Due to security and privacy issues, ...
  • MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS 

    Allahem, Hisham (2013-04-16)
    Radio Frequency Identification (RFID) systems are rapidly becoming popular in a variety of applications such as supply chain management, storage management and healthcare. Such a system consists of a tag with a unique ...
  • RFID AUTHENTICATION SCHEME BASED ON DYNAMIC KEY GENERATION 

    Sran, Amandeep Singh (2012-12-17)
    RFID technology has potential for a number of applications in a wide variety of fields. However, there are several challenges that make it difficult for the technology to be widely deployed; one of it being security. Due ...
  • UHYPERLINK: AN ORGANIZED METHOD TO COLLECT, MANAGE AND STORE OBJECT HYPERLINKS USING RFID 

    Shah, Kuntal (2012-07-12)
    Advancements in ubiquitous computing are allowing users to search and add information to the web for surrounding objects from any location at any time. With more and more information being added to the web, it is becoming ...