Malek Al-Zewairi, Ja'far Alqatawna, Omar Sultan Al-Kadi
{"title":"RFID门禁系统的隐私和安全:没有后端数据库的RFID门禁系统","authors":"Malek Al-Zewairi, Ja'far Alqatawna, Omar Sultan Al-Kadi","doi":"10.1109/AEECT.2011.6132520","DOIUrl":null,"url":null,"abstract":"Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies that facilitate objects identification and information exchange over relatively small and widely separated entities. In this paper, the main aim is to address the privacy and security challenges that RFID Access Control Systems face and solve these challenges without relying on back-end database but only the RF subsystem.","PeriodicalId":408446,"journal":{"name":"2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database\",\"authors\":\"Malek Al-Zewairi, Ja'far Alqatawna, Omar Sultan Al-Kadi\",\"doi\":\"10.1109/AEECT.2011.6132520\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies that facilitate objects identification and information exchange over relatively small and widely separated entities. In this paper, the main aim is to address the privacy and security challenges that RFID Access Control Systems face and solve these challenges without relying on back-end database but only the RF subsystem.\",\"PeriodicalId\":408446,\"journal\":{\"name\":\"2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AEECT.2011.6132520\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AEECT.2011.6132520","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database
Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies that facilitate objects identification and information exchange over relatively small and widely separated entities. In this paper, the main aim is to address the privacy and security challenges that RFID Access Control Systems face and solve these challenges without relying on back-end database but only the RF subsystem.