The Research of RFID System's Authentication Based on the Information Hiding Feature
碩士 === 萬能科技大學 === 資訊管理與數位商業研究所在職專班 === 97 === For recent years, the technology of Radio Frequency Identification (RFID) was concerned and focused by organizations and businesses. In the global market of severe competition, the condition of real-time process and fast response was required for the liv...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/65093284406062141662 |
id |
ndltd-TW-097VNU05845008 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097VNU058450082015-11-13T04:15:06Z http://ndltd.ncl.edu.tw/handle/65093284406062141662 The Research of RFID System's Authentication Based on the Information Hiding Feature 具隱匿性無線射頻認證機制之研究 Shih-Liang Chuang 莊世良 碩士 萬能科技大學 資訊管理與數位商業研究所在職專班 97 For recent years, the technology of Radio Frequency Identification (RFID) was concerned and focused by organizations and businesses. In the global market of severe competition, the condition of real-time process and fast response was required for the living and competition between organization and business. Therefore, to promote the ability of competition and to achieve the object of real-time process & fast response, organizations and businesses are all try to use the character and technology of RFID. In the area of RFID’s application, various technology and scheme were proposed. And also, many research papers were published in the field of data encryption and transmission. But, there exist many weakness of data’s fast transmission, operation’s complexity to be studied to match the optimal balance. Especially, to compare with the wired data transmission, there are much more considerations through the wireless data transmission of RFID. The key points of this paper are to let the RFID system more safety, to promote the applications of RFID’s technology. To achieve the above purpose, we try to use the mutual operations between tags and servers , and to verify the whole system’s safety. In the same time , our scheme will not increase the cost of system’s implementation and the burden of system’s operation. Jonathan, Jen Rong Chen 陳正鎔 2009 學位論文 ; thesis 51 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 萬能科技大學 === 資訊管理與數位商業研究所在職專班 === 97 === For recent years, the technology of Radio Frequency Identification (RFID) was concerned and focused by organizations and businesses. In the global market of severe competition, the condition of real-time process and fast response was required for the living and competition between organization and business. Therefore, to promote the ability of competition and to achieve the object of real-time process & fast response, organizations and businesses are all try to use the character and technology of RFID.
In the area of RFID’s application, various technology and scheme were proposed. And also, many research papers were published in the field of data encryption and transmission. But, there exist many weakness of data’s fast transmission, operation’s complexity to be studied to match the optimal balance.
Especially, to compare with the wired data transmission, there are much more considerations through the wireless data transmission of RFID. The key points of this paper are to let the RFID system more safety, to promote the applications of RFID’s technology. To achieve the above purpose, we try to use the mutual operations between tags and servers , and to verify the whole system’s safety. In the same time , our scheme will not increase the cost of system’s implementation and the burden of system’s operation.
|
author2 |
Jonathan, Jen Rong Chen |
author_facet |
Jonathan, Jen Rong Chen Shih-Liang Chuang 莊世良 |
author |
Shih-Liang Chuang 莊世良 |
spellingShingle |
Shih-Liang Chuang 莊世良 The Research of RFID System's Authentication Based on the Information Hiding Feature |
author_sort |
Shih-Liang Chuang |
title |
The Research of RFID System's Authentication Based on the Information Hiding Feature |
title_short |
The Research of RFID System's Authentication Based on the Information Hiding Feature |
title_full |
The Research of RFID System's Authentication Based on the Information Hiding Feature |
title_fullStr |
The Research of RFID System's Authentication Based on the Information Hiding Feature |
title_full_unstemmed |
The Research of RFID System's Authentication Based on the Information Hiding Feature |
title_sort |
research of rfid system's authentication based on the information hiding feature |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/65093284406062141662 |
work_keys_str_mv |
AT shihliangchuang theresearchofrfidsystemsauthenticationbasedontheinformationhidingfeature AT zhuāngshìliáng theresearchofrfidsystemsauthenticationbasedontheinformationhidingfeature AT shihliangchuang jùyǐnnìxìngwúxiànshèpínrènzhèngjīzhìzhīyánjiū AT zhuāngshìliáng jùyǐnnìxìngwúxiànshèpínrènzhèngjīzhìzhīyánjiū AT shihliangchuang researchofrfidsystemsauthenticationbasedontheinformationhidingfeature AT zhuāngshìliáng researchofrfidsystemsauthenticationbasedontheinformationhidingfeature |
_version_ |
1718130188794986496 |