Amazon cover image
Image from Amazon.com

Radio-frequency identification (RFID) : emerging technologies, applications and improvement strategies / Xinxin Fan, editor.

Contributor(s): Material type: TextTextSeries: Media and communications-- technologies, policies and challengesPublisher: Hauppauge, N.Y. : Nova Science Publishers, Incorporated, 2014Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781631177521
  • 1631177524
Subject(s): Genre/Form: Additional physical formats: Print version:: Radio-frequency identification (RFID)DDC classification:
  • 621.3841/92 23
LOC classification:
  • TK6570.I34
Online resources:
Contents:
RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: DESIGN AND APPLICATION OF RFID TECHNOLOGY IN THE CONTAINER TRANSPORT SYSTEM; Abstract; Introduction; Components, Working Principle and Workflow of RFID System; Design of RFID System in Container Terminal; Electronic Tags System Construction, Application and Evaluation in Container Port Based on RFID Technology.
Evaluation of RFID Electronic Label System Application in Container TransportationRFID Application Analyses in Container Port; References; Chapter 2: RFID TECHNOLOGY FOR DRUG LABELLING IN THE EMERGENCY DEPARTMENT: RFID TO MINIMISE THE OCCURRENCE OF ADVERSE EVENTS; Abstract; Introduction; Methods; Configurable Parameters of the RFID Labels; Requirements of the Selected RFID Label; Discussion; Acknowledgments; References; Chapter 3: APPLICATIONS OF RFID TECHNOLOGY IN THE CONSTRUCTION INDUSTRY: AN ACADEMIC LITERATURE REVIEW; Abstract; Introduction; RFID Technology: An Overview.
Practical Issues Associated with the Use of RFID in ConstructionConclusion; References; Chapter 4: SOFTWARE DEFINED RADIO, GNU RADIO, RFID AND THEIR APPLICATIONS; Abstract; 1. Introduction; 2. Need for SDR; 3. Evolution of SDR; 4. SPEAKeasy; 5. GNU Radio; 6. Universal Software Radio Peripheral (USRP); 7. RFID Architecture; 8. USRP for Emulating an RFID Reader; References; Chapter 5: ASPECTS OF RFID SECURITIES; Abstract; 1. Introduction; 2. Overview of Security of EPCglobal Class 1 Gen 2 UHF Tags; 3. RFID Attacks and Countermeasures; Conclusion; References.
Chapter 6: LIGHTWEIGHT CRYPTOGRAPHY FOR PASSIVE RFID SYSTEMS: A RESEARCH SURVEYAbstract; 1. Introduction; 2. Lightweight Block Ciphers; 3. Lightweight Stream Ciphers; 4. Lightweight (Pseudo)Random Number Generators; Conclusion; References; Chapter 7: LOW-COMPLEXITY ATTACKS ON SELECTED LIGHTWEIGHT STREAM CIPHERS; Abstract; 1. Introduction; 2. Crypto-1; 3. Hitag-2 Cipher; 4. The Atmel Cipher; 5. A2U2: A Lightweight Stream Cipher for RFID Tags; 6. Conclusion; References; Chapter 8: GROUPING PROOF PROTOCOLS BASED ON LOW-COST RFID TAGS; Abstract; 1. Introduction; 2. RelatedWork.
3. The Proposed Protocols4. Security Analysis and Performance Evaluation; Conclusion; Acknowledgment; References; Chapter 9: SIDE-CHANNEL ATTACKS ON RFID SYSTEMS -- STATE OF THE ART; Abstract; 1. Introduction; 2. Operation Principle of Passive RFID Systems; 3. Side-Channel Attacks; 4. Tools for Side-Channel Attacks on RFID Systems; 5. A Framework for Side-Channel Attacks on RFID Systems; 6. Side-Channel Attacks on RFID Systems in Practice; Conclusion; References; INDEX.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Includes bibliographical references and index.

RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: DESIGN AND APPLICATION OF RFID TECHNOLOGY IN THE CONTAINER TRANSPORT SYSTEM; Abstract; Introduction; Components, Working Principle and Workflow of RFID System; Design of RFID System in Container Terminal; Electronic Tags System Construction, Application and Evaluation in Container Port Based on RFID Technology.

Evaluation of RFID Electronic Label System Application in Container TransportationRFID Application Analyses in Container Port; References; Chapter 2: RFID TECHNOLOGY FOR DRUG LABELLING IN THE EMERGENCY DEPARTMENT: RFID TO MINIMISE THE OCCURRENCE OF ADVERSE EVENTS; Abstract; Introduction; Methods; Configurable Parameters of the RFID Labels; Requirements of the Selected RFID Label; Discussion; Acknowledgments; References; Chapter 3: APPLICATIONS OF RFID TECHNOLOGY IN THE CONSTRUCTION INDUSTRY: AN ACADEMIC LITERATURE REVIEW; Abstract; Introduction; RFID Technology: An Overview.

Practical Issues Associated with the Use of RFID in ConstructionConclusion; References; Chapter 4: SOFTWARE DEFINED RADIO, GNU RADIO, RFID AND THEIR APPLICATIONS; Abstract; 1. Introduction; 2. Need for SDR; 3. Evolution of SDR; 4. SPEAKeasy; 5. GNU Radio; 6. Universal Software Radio Peripheral (USRP); 7. RFID Architecture; 8. USRP for Emulating an RFID Reader; References; Chapter 5: ASPECTS OF RFID SECURITIES; Abstract; 1. Introduction; 2. Overview of Security of EPCglobal Class 1 Gen 2 UHF Tags; 3. RFID Attacks and Countermeasures; Conclusion; References.

Chapter 6: LIGHTWEIGHT CRYPTOGRAPHY FOR PASSIVE RFID SYSTEMS: A RESEARCH SURVEYAbstract; 1. Introduction; 2. Lightweight Block Ciphers; 3. Lightweight Stream Ciphers; 4. Lightweight (Pseudo)Random Number Generators; Conclusion; References; Chapter 7: LOW-COMPLEXITY ATTACKS ON SELECTED LIGHTWEIGHT STREAM CIPHERS; Abstract; 1. Introduction; 2. Crypto-1; 3. Hitag-2 Cipher; 4. The Atmel Cipher; 5. A2U2: A Lightweight Stream Cipher for RFID Tags; 6. Conclusion; References; Chapter 8: GROUPING PROOF PROTOCOLS BASED ON LOW-COST RFID TAGS; Abstract; 1. Introduction; 2. RelatedWork.

3. The Proposed Protocols4. Security Analysis and Performance Evaluation; Conclusion; Acknowledgment; References; Chapter 9: SIDE-CHANNEL ATTACKS ON RFID SYSTEMS -- STATE OF THE ART; Abstract; 1. Introduction; 2. Operation Principle of Passive RFID Systems; 3. Side-Channel Attacks; 4. Tools for Side-Channel Attacks on RFID Systems; 5. A Framework for Side-Channel Attacks on RFID Systems; 6. Side-Channel Attacks on RFID Systems in Practice; Conclusion; References; INDEX.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library