A Research on Low-computational-load Authentication Protocols
碩士 === 國立臺中科技大學 === 資訊工程系碩士班 === 102 === Nowadays, more and more services are provided via mobile devices and chips of limited computation ability. Moreover, because passive tags are cheap and need no battery, plenty of applications adopt RFID systems of passive tags - electronic purses for example....
Main Authors: | Ti-Sheng Kwang, 關廸昇 |
---|---|
Other Authors: | Ya-Fen Chang |
Format: | Others |
Language: | en_US |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/6p6532 |
Similar Items
-
The Research on Wi-Fi Positioning Spoofing Attacks and Authentication Protocols
by: An-Ti Hsu, et al.
Published: (2016) -
Hardware and protocols for authentication and secure computation
by: Juvekar, Chiraag (Chiraag Shashikant)
Published: (2018) -
A Protocol of Mobile IP AuthenticationBased on Hierarchy Access Control
by: chih-sheng chou, et al.
Published: (2003) -
A Research on Authentication Protocols for Wireless Communications
by: Chih-Hsuan Peng, et al.
Published: (2017) -
A Research on Authentication Protocols for Wireless Communications
by: Yung-Chi Chen, et al.
Published: (2015)