- p0104 proteus+keil 8051+max517 具体实现矩形波
- Apress.The.Definitive.Guide.to.SQLite.May.2006 在Android中用java开发是所用的数据库 SQLite
- 222 MIMO频率选择性信道自适应均衡
- ucos_arm7_MP3 Arm7 mp3播放器(ucos ii系统)
- How-To-Setup-on-Raspberry-Pi.txt.tar Basic Steps (Detailed below) 1. Install NOOBS. 2. login with ssh. 3. Set the network to static IP Address. 4. Set the hostname to raspbian. 5. Update and upgrade your firmware and software. 6. Increase RAM memory allocation. 7. Installed a FTP Server. 8. Installed USB library for development. 9. Install Ramlog. (Optional) 10. Install a web Server. 11. Setup Local DNS access on your PC browser. 12. Make a backup copy of the SD card using dd.
- Winhex WinHex的核心是通用的十六進制編輯器
文件名称:2
介绍说明--下载内容来自于网络,使用问题请自行百度
RFID系统的IEEE的文章,安全协议,认证-
In this paper, we first propose a cryptographic
authentication protocol which meets the privacy
protection for tag bearers, and then a digital Codec for
RFID tag is designed based on the protocol. The
protocol which uses cryptographic hash algorithm is
based on a three-way challenge response
authentication scheme.
In addition, we will show how the three different
types of protocol frame formats are formed by
extending the ISO/IEC 18000-3 standard[3] for
implementing the proposed authentication protocol in
RFID system environment. The system has been
described in Verilog HDL and also synthesized using
Synopsys Design Compiler with Hynix 0.25 µ m
standard-cell library. From implementation results, we
found that the proposed scheme is well suite to
implement robust RFID system against active attacks
such as the man-in-the-middle attack.
In this paper, we first propose a cryptographic
authentication protocol which meets the privacy
protection for tag bearers, and then a digital Codec for
RFID tag is designed based on the protocol. The
protocol which uses cryptographic hash algorithm is
based on a three-way challenge response
authentication scheme.
In addition, we will show how the three different
types of protocol frame formats are formed by
extending the ISO/IEC 18000-3 standard[3] for
implementing the proposed authentication protocol in
RFID system environment. The system has been
described in Verilog HDL and also synthesized using
Synopsys Design Compiler with Hynix 0.25 µ m
standard-cell library. From implementation results, we
found that the proposed scheme is well suite to
implement robust RFID system against active attacks
such as the man-in-the-middle attack.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
1.pdf
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
