The International Arab Journal of Information Technology (IAJIT)

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques

Abstract:   Nowadays,  the  vital  parts  of  the  business  programs   are  the  data  warehouses  and  the  data  mining  techni ques. 

A new Model of Multi-Key Generation for RFID Access Control System

handling modern security threats, with access decisions influenced by several factors, including situational, environmental

On the Security of Two Ownership Transfer

1Electrical Engineering Department, Shahid Rajaee Teacher Training University, Iran 2Computer Engineering Department, Shahid Rajaee Teacher Training University, Iran

An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques

Abstract:   Nowadays,  the  vital  parts  of  the  business  programs   are  the  data  warehouses  and  the  data  mining  techni ques.