搜索资源列表
Syngress.RFID.Security.Apr.2006.eBook-DDU
- RFID.Security指南 安全性是rfid的重要因素,本书详细探讨了rfid的安全性问题,英文-RFID.Security Guide rfid safety is an important factor, The book explored in detail the rfid security issue, English
RFID-Security
- RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006
RFID-Security
- Radio Frequency Identification [RFID] systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we
RFID-tags-security-and-the-individual
- RFID – An introduction RFID tags, security and the individual-When I lastwrote for CSLR, RFID tagswere but a glimmer in some scientist’s eye. The thought that by 2006 they would be in everyday use [even if we did not know it] was unthinkable.
RFID-Ripe-For-Informed-Debate
- RFID, the wireless technology that has helped millions of people around the world to protect their property and make their workplaces safer is now in danger of being viewed as a security risk. Ray Stanton examines the love-hate relationship b
timo_kasper___embedded_security_analysis_of_rfid_
- Embedded Security Analysis of RFID Devices
RFIDSecurity
- RFID Security protocols
AnRFIDSecurityModule
- An RFID Security Module
RFID_Test_Smartcard
- RFID Security check and assesment
RFID_atten_FLOWCHARTS
- rfid application for security purpose
NFC_Overview_draft
- This Power Point slide talks about RFID technology overview. Contents: + Introduction. + Basic Features. + Related Technologies. + Applications. + Security Aspects.
RFID_Security_(2006)
- focused on the technical security aspects of using RFID, specifically the physical and data layers
RFID-security-system
- This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects p
hash
- 适用于RFID安全认证协议的轻量级hash算法,输出64bit数据。-Applicable to lightweight RFID authentication protocol security hash algorithm, output 64bit data.
Windows_Embedded_CE_6
- 本书全面深入地介绍了Windows Embedded CE 6.0开发环境,通过一系列的示例练习揭示了CE 6.0的开发和应用。 本书全面深入地介绍了Windows Embedded CE 6.0开发环境,通过一系列的示例练习揭示了CE 6.0的开发和应用。基础部分主要包括CE 6.0概述、开发环境和开发工具、可用资源,以及调试和调试工具。程序开发部分介绍了CE 6.0的原生代码应用程序、C#应用程序、VB应用程序、自启动应用程序,以及定制UI。项目开发部分主要介绍了瘦客户端应用程序、家庭自
rfid
- rfid商品防伪系统,基于对RFID系统建设的研究-rfid security system products, based on the construction of RFID system
airport
- 机场无线定位解决方案介绍。包括利用RTLS、RFID系统进行人员和资产管理的介绍。-Airport wireless location solutions for introduction. Including the use of RTLS, RFID and asset management system for staff presentation.
RFID-security-key-technology
- 。重点研究了RFID 防伪体系中关键技术的设计,利用RFID 中间件实现射频标签 和读写器相互认证;-Focuses on key technologies in the RFID security system design, the use of RFID tags RFID middleware And the reader mutual authentication
RFID-Security---F.-Thornton--B.-Haines--A.-Das--e
- RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006
rfid
- 首先介绍实数域上的椭圆 曲线及其运算规则,在此基础上引入有限域上的椭圆曲线及其困难性问题;然后 介绍了 Edwards 曲线的数学基础,以及方案构建所需的可证明安全理论;最后介 绍了移动 RFID 系统及其安全需求、移动 RFID 安全认证等基础知识。-First of all introduce real number domain ellipse Curve and its operation rules, on the basis of the introducti