Accesso libero

Application of Chaotic Encryption in RFID Data Transmission Security

,  e   
25 set 2019
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Figure 1.

Diagram of the components of the RFID system.
Diagram of the components of the RFID system.

Figure 2.

Data information encryption/decryption schematic.
Data information encryption/decryption schematic.

Figure 3.

Chaotic sequence generator process diagram.
Chaotic sequence generator process diagram.

Figure 4.

Logistic map bifurcation diagram.
Logistic map bifurcation diagram.

Figure 5.

Logistic chaotic encryption flow chart.
Logistic chaotic encryption flow chart.

Figure 6.

RFID system security model.
RFID system security model.

Figure 7.

Read and write control mechanism after chaotic encryption.
Read and write control mechanism after chaotic encryption.
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Informatica, Informatica, altro