The Research of RFID System's Authentication Based on the Information Hiding Feature

碩士 === 萬能科技大學 === 資訊管理與數位商業研究所在職專班 === 97 === For recent years, the technology of Radio Frequency Identification (RFID) was concerned and focused by organizations and businesses. In the global market of severe competition, the condition of real-time process and fast response was required for the liv...

Full description

Bibliographic Details
Main Authors: Shih-Liang Chuang, 莊世良
Other Authors: Jonathan, Jen Rong Chen
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/65093284406062141662
id ndltd-TW-097VNU05845008
record_format oai_dc
spelling ndltd-TW-097VNU058450082015-11-13T04:15:06Z http://ndltd.ncl.edu.tw/handle/65093284406062141662 The Research of RFID System's Authentication Based on the Information Hiding Feature 具隱匿性無線射頻認證機制之研究 Shih-Liang Chuang 莊世良 碩士 萬能科技大學 資訊管理與數位商業研究所在職專班 97 For recent years, the technology of Radio Frequency Identification (RFID) was concerned and focused by organizations and businesses. In the global market of severe competition, the condition of real-time process and fast response was required for the living and competition between organization and business. Therefore, to promote the ability of competition and to achieve the object of real-time process & fast response, organizations and businesses are all try to use the character and technology of RFID. In the area of RFID’s application, various technology and scheme were proposed. And also, many research papers were published in the field of data encryption and transmission. But, there exist many weakness of data’s fast transmission, operation’s complexity to be studied to match the optimal balance. Especially, to compare with the wired data transmission, there are much more considerations through the wireless data transmission of RFID. The key points of this paper are to let the RFID system more safety, to promote the applications of RFID’s technology. To achieve the above purpose, we try to use the mutual operations between tags and servers , and to verify the whole system’s safety. In the same time , our scheme will not increase the cost of system’s implementation and the burden of system’s operation. Jonathan, Jen Rong Chen 陳正鎔 2009 學位論文 ; thesis 51 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 萬能科技大學 === 資訊管理與數位商業研究所在職專班 === 97 === For recent years, the technology of Radio Frequency Identification (RFID) was concerned and focused by organizations and businesses. In the global market of severe competition, the condition of real-time process and fast response was required for the living and competition between organization and business. Therefore, to promote the ability of competition and to achieve the object of real-time process & fast response, organizations and businesses are all try to use the character and technology of RFID. In the area of RFID’s application, various technology and scheme were proposed. And also, many research papers were published in the field of data encryption and transmission. But, there exist many weakness of data’s fast transmission, operation’s complexity to be studied to match the optimal balance. Especially, to compare with the wired data transmission, there are much more considerations through the wireless data transmission of RFID. The key points of this paper are to let the RFID system more safety, to promote the applications of RFID’s technology. To achieve the above purpose, we try to use the mutual operations between tags and servers , and to verify the whole system’s safety. In the same time , our scheme will not increase the cost of system’s implementation and the burden of system’s operation.
author2 Jonathan, Jen Rong Chen
author_facet Jonathan, Jen Rong Chen
Shih-Liang Chuang
莊世良
author Shih-Liang Chuang
莊世良
spellingShingle Shih-Liang Chuang
莊世良
The Research of RFID System's Authentication Based on the Information Hiding Feature
author_sort Shih-Liang Chuang
title The Research of RFID System's Authentication Based on the Information Hiding Feature
title_short The Research of RFID System's Authentication Based on the Information Hiding Feature
title_full The Research of RFID System's Authentication Based on the Information Hiding Feature
title_fullStr The Research of RFID System's Authentication Based on the Information Hiding Feature
title_full_unstemmed The Research of RFID System's Authentication Based on the Information Hiding Feature
title_sort research of rfid system's authentication based on the information hiding feature
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/65093284406062141662
work_keys_str_mv AT shihliangchuang theresearchofrfidsystemsauthenticationbasedontheinformationhidingfeature
AT zhuāngshìliáng theresearchofrfidsystemsauthenticationbasedontheinformationhidingfeature
AT shihliangchuang jùyǐnnìxìngwúxiànshèpínrènzhèngjīzhìzhīyánjiū
AT zhuāngshìliáng jùyǐnnìxìngwúxiànshèpínrènzhèngjīzhìzhīyánjiū
AT shihliangchuang researchofrfidsystemsauthenticationbasedontheinformationhidingfeature
AT zhuāngshìliáng researchofrfidsystemsauthenticationbasedontheinformationhidingfeature
_version_ 1718130188794986496