English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 18278/19583 (93%)
造訪人次 : 918689      線上人數 : 964
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: http://nhuir.nhu.edu.tw/handle/987654321/22903


    題名: 無線射頻識別環境中相互認證方式之研究:以二次剩餘理論為基礎
    其他題名: A Study on RFID Mutual Authentication Protocol Based on Theory of Quadratic Residues
    作者: 曾士軒
    Tzeng, Shr-shiuan
    貢獻者: 資訊管理學研究所
    周志賢
    Jue-sam Chou
    關鍵詞: 無線射頻識別(RFID);相互認證;二次剩餘
    Radio Frequency Identification;Quadratic Residues;Mutual Authentication
    日期: 2007
    上傳時間: 2015-08-07 13:28:01 (UTC+8)
    摘要:   無線射頻識別 (RFID) 提供了採用無線電波進行資料傳送及識別物件唯一性的技術及系統。這使得其代替了現行的條碼系統,並且於我們日常生活中之諸多領域上變得更加普及。其也提供了避免偽造、簡單的身份檢查及安全性的加強等應用。然而, RFID 技術在隱私性及安全性等方面也帶來了新的風險。因 RFID 系統主要是透過無線電頻率進行無線傳送,使得其在識別過程中的相關資訊容易遭到第三方惡意地竊聽,這也是其被廣泛使用前的主要障礙之一。過去幾年來,有諸多研究從不同觀點提出解決關於 RFID 隱私及安全問題之方法。我們在回顧了一些協定後,提出一個利用二次剩餘理論且可用於低成本 RFID 標籤上之相互認證協定,並同時可滿足安全、效率及成本上之要求。另外,我們所提出之協定是很簡單的,且可以很容易使用標準密碼學上之雜湊函數進行實作。
      Radio Frequency Identification (RFID) refers to technologies and systems that use radio waves to transmit and uniquely identify objects. These are poise to supplant barcodes, and become perva-sive for many domains in our daily lives. These also provide to re-duce fraud, easy identity checks, and enhance security. However, RFID technology also raises new risks about the privacy and security implications. RFID system has been conducted by wireless com-munication of radio frequency so that the information on identifi-cation could be eavesdropping by the third party maliciously. There are major impediments to their widespread use. Over the past few years, several streams of research have emerged approaching the RFID privacy/security problem from different perspectives. We study a few protocols and propose a novel mutual authentication protocol based on quadratic residues for low-cost RFID tags, and can satisfy security, performance and cost requirement at the same time. Additionally, our protocol is very simple and it can be imple-mented easily with the use of standard cryptographic hash func-tions.
    顯示於類別:[資訊管理學系] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    095NHU05396026-001.pdf557KbAdobe PDF23檢視/開啟
    index.html0KbHTML383檢視/開啟


    在NHUIR中所有的資料項目都受到原著作權保護.

    TAIR相關文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋