Have a personal or library account? Click to login
Application of Chaotic Encryption in RFID Data Transmission Security Cover

Application of Chaotic Encryption in RFID Data Transmission Security

Open Access
|Sep 2019

Figures & Tables

Figure 1.

Diagram of the components of the RFID system.

Figure 2.

Data information encryption/decryption schematic.

Figure 3.

Chaotic sequence generator process diagram.

Figure 4.

Logistic map bifurcation diagram.

Figure 5.

Logistic chaotic encryption flow chart.

Figure 6.

RFID system security model.

Figure 7.

Read and write control mechanism after chaotic encryption.
Language: English
Page range: 90 - 96
Published on: Sep 25, 2019
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Jianfang Yang, Baolong Liu, Huimin Yao, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.