ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: RFID
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID
#Low*cost RFID
# cryptography
# protocol
# vulnerabilit y
An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques
Abstract: Nowadays, the vital parts of the business programs are the data warehouses and the data mining techni ques.
# Data warehousing system
# data cleaning
# data transf ormation
# data loading
# dirty data
# RFID
# suspicious tags
A new Model of Multi-Key Generation for RFID Access Control System
handling modern security threats, with access decisions influenced by several factors, including situational, environmental
#Encryption key generation model
# Risk-based access control
# Radio frequency identification
On the Security of Two Ownership Transfer
1Electrical Engineering Department, Shahid Rajaee Teacher Training University, Iran 2Computer Engineering Department, Shahid Rajaee Teacher Training University, Iran
#RFID
# cryptanalysis
# ownership transfer protocol
# de-synchronization attack
An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques
Abstract: Nowadays, the vital parts of the business programs are the data warehouses and the data mining techni ques.
# Data warehousing system
# data cleaning
# data transf ormation
# data loading
# dirty data
# RFID
# suspicious tags
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint