Radio-frequency identification (RFID) : emerging technologies, applications and improvement strategies / Xinxin Fan, editor.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- text
- computer
- online resource
- 9781631177521
- 1631177524
- 621.3841/92 23
- TK6570.I34
Item type | Home library | Collection | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
OPJGU Sonepat- Campus | E-Books EBSCO | Available |
Includes bibliographical references and index.
RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; RADIO-FREQUENCY IDENTIFICATION (RFID): EMERGING TECHNOLOGIES, APPLICATIONS AND IMPROVEMENT STRATEGIES; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: DESIGN AND APPLICATION OF RFID TECHNOLOGY IN THE CONTAINER TRANSPORT SYSTEM; Abstract; Introduction; Components, Working Principle and Workflow of RFID System; Design of RFID System in Container Terminal; Electronic Tags System Construction, Application and Evaluation in Container Port Based on RFID Technology.
Evaluation of RFID Electronic Label System Application in Container TransportationRFID Application Analyses in Container Port; References; Chapter 2: RFID TECHNOLOGY FOR DRUG LABELLING IN THE EMERGENCY DEPARTMENT: RFID TO MINIMISE THE OCCURRENCE OF ADVERSE EVENTS; Abstract; Introduction; Methods; Configurable Parameters of the RFID Labels; Requirements of the Selected RFID Label; Discussion; Acknowledgments; References; Chapter 3: APPLICATIONS OF RFID TECHNOLOGY IN THE CONSTRUCTION INDUSTRY: AN ACADEMIC LITERATURE REVIEW; Abstract; Introduction; RFID Technology: An Overview.
Practical Issues Associated with the Use of RFID in ConstructionConclusion; References; Chapter 4: SOFTWARE DEFINED RADIO, GNU RADIO, RFID AND THEIR APPLICATIONS; Abstract; 1. Introduction; 2. Need for SDR; 3. Evolution of SDR; 4. SPEAKeasy; 5. GNU Radio; 6. Universal Software Radio Peripheral (USRP); 7. RFID Architecture; 8. USRP for Emulating an RFID Reader; References; Chapter 5: ASPECTS OF RFID SECURITIES; Abstract; 1. Introduction; 2. Overview of Security of EPCglobal Class 1 Gen 2 UHF Tags; 3. RFID Attacks and Countermeasures; Conclusion; References.
Chapter 6: LIGHTWEIGHT CRYPTOGRAPHY FOR PASSIVE RFID SYSTEMS: A RESEARCH SURVEYAbstract; 1. Introduction; 2. Lightweight Block Ciphers; 3. Lightweight Stream Ciphers; 4. Lightweight (Pseudo)Random Number Generators; Conclusion; References; Chapter 7: LOW-COMPLEXITY ATTACKS ON SELECTED LIGHTWEIGHT STREAM CIPHERS; Abstract; 1. Introduction; 2. Crypto-1; 3. Hitag-2 Cipher; 4. The Atmel Cipher; 5. A2U2: A Lightweight Stream Cipher for RFID Tags; 6. Conclusion; References; Chapter 8: GROUPING PROOF PROTOCOLS BASED ON LOW-COST RFID TAGS; Abstract; 1. Introduction; 2. RelatedWork.
3. The Proposed Protocols4. Security Analysis and Performance Evaluation; Conclusion; Acknowledgment; References; Chapter 9: SIDE-CHANNEL ATTACKS ON RFID SYSTEMS -- STATE OF THE ART; Abstract; 1. Introduction; 2. Operation Principle of Passive RFID Systems; 3. Side-Channel Attacks; 4. Tools for Side-Channel Attacks on RFID Systems; 5. A Framework for Side-Channel Attacks on RFID Systems; 6. Side-Channel Attacks on RFID Systems in Practice; Conclusion; References; INDEX.
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide
There are no comments on this title.