Accès libre

Application of Chaotic Encryption in RFID Data Transmission Security

,  et   
25 sept. 2019
À propos de cet article

Citez
Télécharger la couverture

Figure 1.

Diagram of the components of the RFID system.
Diagram of the components of the RFID system.

Figure 2.

Data information encryption/decryption schematic.
Data information encryption/decryption schematic.

Figure 3.

Chaotic sequence generator process diagram.
Chaotic sequence generator process diagram.

Figure 4.

Logistic map bifurcation diagram.
Logistic map bifurcation diagram.

Figure 5.

Logistic chaotic encryption flow chart.
Logistic chaotic encryption flow chart.

Figure 6.

RFID system security model.
RFID system security model.

Figure 7.

Read and write control mechanism after chaotic encryption.
Read and write control mechanism after chaotic encryption.
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Informatique, Informatique, autres