検索結果 2 件

デジタル記事
斎藤, 純一郎, 柳, 在哲, 櫻井, 幸一Springer2004-08Proc. of Int. Conf. on Embedded and Ubiquitous Computing(EUC 2004)1p.879-890
インターネットで読める全国の図書館
デジタル記事
2004-08Proc. of Int. Conf. on Embedded and Ubiquitous Computing(EUC 2004)1p.879-890
インターネットで読める全国の図書館
  • 要約等...dentification (RFID) tag is a smal......and an antenna for radio communic......d as a reader. For this reason, the RFID tag is used for management of goods and it i......s a substitute for a bar code. However, RFID system may inf......n a consumer’s privacy because it has......y. Although ID of a RFID tag can be enc......ing specific information. Therefore, we discuss the privacy protection using universal re-encryption proposed by Go......a modification of the information on RFID tags, it can be exp......attacker. Therefore we point out ......g modification of the information on RFID tags. Moreover, we offer two proposed schemes for a...

検索結果は以上です。