원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Radio Frequency Identification (RFID) systems have become popular for identifying not
only objects but also persons. For example, in supply chain applications, the company can
constantly track the movements of goods. Also, for Body Area Network or Personal Area
Work, the tag is usually used for identifying a person. However, the movements and current
locations of goods and a person’s activity profiles are the sensitive information and should be
kept secret. This paper develops the interaction protocols between readers and tags to
address this privacy issue of protecting tagged objects from tracking and tracing by
unauthorized readers.
목차
Abstract
1. Introduction
2. Formatting your paper
2.1. Previous Works
2.2. Motivation
3. The Propose Schemes
3.1. Scheme A
3.2. Scheme B
3.3. Scheme C
4. Security Analyses and Comparison
5. Conclusions
6. Acknowledgement
7. References
8. Appendix
1. Introduction
2. Formatting your paper
2.1. Previous Works
2.2. Motivation
3. The Propose Schemes
3.1. Scheme A
3.2. Scheme B
3.3. Scheme C
4. Security Analyses and Comparison
5. Conclusions
6. Acknowledgement
7. References
8. Appendix
저자정보
참고문헌
자료제공 : 네이버학술정보
