Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/15825
Title: Data protection in the RFID era
Authors: Wong, K
Hui, P 
Chan, A 
Issue Date: 2004
Publisher: Business Press Ltd
Source: Textile Asia, 2004, v. 35, no. 10, p. 25-27 How to cite?
Journal: Textile Asia 
Abstract: Various schemes use radio frequency identification (RFID) for apparel data protection, along with encryption algorithms for RFID tags. In the cryptography approach, particular vendor type of reader's public key and its unique private key should be carried by each tag, and during reading, with the help of embedded keys, readers and tags may mutually authenticate each other. The Hash Function approach is simple and straight forward to achieve data protection, where the electronic product code (EPC) in the tag is being protected, and only an authorized reader is able to unlock the tag, then lock the tag after reading the code. The Randomized Hash Lock is an extension of the Hash Lock based on pseudo-random functions (PRF), where an additional pseudo-random number is required to embed into tags for this approach. It is noted that if one can afford high-cost tags, then many capabilities can be incorporated inside tags, namely, computation, encryption and the like.
URI: http://hdl.handle.net/10397/15825
ISSN: 0049-3554
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

1
Last Week
0
Last month
Citations as of Nov 16, 2017

Page view(s)

54
Last Week
0
Last month
Checked on Nov 19, 2017

Google ScholarTM

Check



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.