Basic Search / Search Result

  • Search Result: 7results Search Strategy: "Yuan-Cheng Lai".ecommittee (Phrase) and ekeyword.raw="RFID" and ekeyword.raw="RFID" and ekeyword.raw="Privacy" and ekeyword.raw="Privacy"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    On design of a Secure RFID-based e-Health System for Outpatient Clinic Process and Emergency Care Process

    2

    A Guideline to Establish RFID Applications Privacy Policies Considering Openness and Enforcement
    • Department of Information Management /98/ Master
    • Author: Jen-Ting Ku Advisor: Shi-Cho Cha
    • As advances of RFID technologies, privacy and personal data security of RFID applications is brough…
    • Clicks: 330Downloads: 0
    • Full text public date 2012/07/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    A Secure Mutual Authentication Protocol for Low-cost RFID System

    4

    An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard

    5

    Security Analysis for RFID Authentication Protocols with Key Redundancy Mechanism on De-synchronization Attack

    6

    An Efficient and Flexible Way to Protect Privacy in RFID Environment with Licenses
    • Department of Information Management /97/ Master
    • Author: Kuan-Ju Huang Advisor: Shi-Cho Cha
    • To release the tension between the convenience and the privacy risk brought by RFID systems, organi…
    • Clicks: 365Downloads: 3
    • Full text public date 2014/07/28 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    A Combined Low Cost RFID Tag Collision Resolution Protocol with Authentication
    1