Hybrid improved technique for data security and authentication for RFID tags

Author(s):  
Anandika Sharma ◽  
Amardeep Singh
2014 ◽  
Vol 513-517 ◽  
pp. 1005-1008
Author(s):  
Xiao Ming Yao ◽  
Hong Yu Chen ◽  
Hong Lei Li ◽  
Xiao Yi Zhou

Data tampering as one of the primary security issues in RFID-enabled applications has been presented in recent years and proposals based on watermarking have been put forward to address different aspects of tampering in RFID tags. However, most of current researches are focused on the way of generating the watermark from the data to be protected and embedding it into the tag field (usually the field of serial number or SN) used as the cover medium, thus the innate structural coding relationship as a new clue to guess out the hidden watermark might be ignored. In this paper, this flaw has been fully considered, and a novel tamper detection method using CFB based encryption to hide the location clues is presented. Although it cant resist the attack from statistical analysis either, theoretical analysis has demonstrated that our scheme outperforms its previous counterparts in data security.


2009 ◽  
Vol 42 (21) ◽  
pp. 1-2
Author(s):  
ERIK L. GOLDMAN
Keyword(s):  

1997 ◽  
Vol 36 (02) ◽  
pp. 79-81
Author(s):  
V. Leroy ◽  
S. Maurice-Tison ◽  
B. Le Blanc ◽  
R. Salamon

Abstract:The increased use of computers is a response to the considerable growth in information in all fields of activities. Related to this, in the field of medicine a new component appeared about 40 years ago: Medical Informatics. Its goals are to assist health care professionals in the choice of data to manage and in the choice of applications of such data. These possibilities for data management must be well understood and, related to this, two major dangers must be emphasized. One concerns data security, and the other concerns the processing of these data. This paper discusses these items and warns of the inappropriate use of medical informatics.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


1970 ◽  
Vol 23 (03) ◽  
pp. 601-620 ◽  
Author(s):  
Th. B Tschopp

SummaryAggregation of cat platelets in the citrated plasma is examined by means of Born’s absorptiometer. A marked tendency of the platelets of this species to spontaneous aggregation necessitated first of all the development of an improved technique of blood collection.A hypothesis according to which 5-HT is released from the platelets, explains the absence of oscillations on the base line of the absorptiometer, the absence of platelet swelling, when ADP is added, and the effect of stirring on the aggregation curves in cat PRP. The average volume of cat platelets amounts to 10.46 μ3 when directly fixed in the blood, when fixed from PRP to 12.17 μ3, when fixed from stirred PRP to 13.51 μ3.In low concentrations (0.3-2 μM) ADP produce reversible aggregation; in narrowly restricted, individually dissimilar mean concentrations irreversible aggregation in two phases and in high concentrations, irreversible aggregation in one phase. Like ADP serotonin produces 2 phase irreversible aggregation in concentrations of 3-10 μM, but unlike ADP, the aggregation velocity decreases again with high 5-HT concentrations (>100 μM). Adrenaline does not produce aggregation and it is likely that adenosine and adenosine monophosphate inhibit the aggregation by serotonin but not by ADP. Species differences in the aggregation of human, rabbit and cat platelets are discussed.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2012 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Shameena Begum ◽  
◽  
V.Ratna Vasuki ◽  
K.V.V.Srinivas K.V.V.Srinivas

Sign in / Sign up

Export Citation Format

Share Document