Have a personal or library account? Click to login
Application of Chaotic Encryption in RFID Data Transmission Security Cover

Application of Chaotic Encryption in RFID Data Transmission Security

Open Access
|Sep 2019

Figures & Tables

Figure 1.

Diagram of the components of the RFID system.
Diagram of the components of the RFID system.

Figure 2.

Data information encryption/decryption schematic.
Data information encryption/decryption schematic.

Figure 3.

Chaotic sequence generator process diagram.
Chaotic sequence generator process diagram.

Figure 4.

Logistic map bifurcation diagram.
Logistic map bifurcation diagram.

Figure 5.

Logistic chaotic encryption flow chart.
Logistic chaotic encryption flow chart.

Figure 6.

RFID system security model.
RFID system security model.

Figure 7.

Read and write control mechanism after chaotic encryption.
Read and write control mechanism after chaotic encryption.
Language: English
Page range: 90 - 96
Published on: Sep 25, 2019
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Jianfang Yang, Baolong Liu, Huimin Yao, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.