Have a personal or library account? Click to login
Application of Chaotic Encryption in RFID Data Transmission Security Cover

Application of Chaotic Encryption in RFID Data Transmission Security

Open Access
|Sep 2019

References

  1. ZHANG Yong-ping, WANG Feng-jian. Research of Chaotic Encryption Based RFID System Information Security[J]. Computer Security, 2010.
  2. ZHAO Yu-hua. The research of security protocol in RFID system based on theory of chaotic cryptography[D]. Master’s Degree Thesis of Hunan University, 2011.
  3. DENG Ai-ping, XIAO Ben. Application of Chaotic Encryption Algorithm in RFID Secure Mechanism[J]. Materials Science and Information Technology, 2012.
  4. DING Xin. Hyper-chaotic Encryption Based RFID System Information Security[J]. China Conference, 2006.
  5. ZHAO Yu-xin, WANG Wei, LIU Li-qiang. A Design and Analysis for Non-linear Combination Chaotic Stream Cipher Based on Logistic Map[J]. Journal of Projectiles and Guides, 2007.
  6. QIU Yue-hong, HE Chen, ZHU Hong-wen. One Chaotic Map with Infinite Collapses and Its Quantified Sequences[J]. Journal of Shanghai Jiaotong University, 2002.
  7. WU Hong, DING Qun, ZHOU Ping. Logistic Chaotic Sequence Design and Application in Data Encryption [J]. Journal of Instrumentation, 2009.
  8. Geo-Su Yim. Design of an RFID Communication Protocol Using Synchronized Chaotic Systems[J]. Journal of Korea Institute of Information and Telecommunications Technology, 2016.
Language: English
Page range: 90 - 96
Published on: Sep 25, 2019
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Jianfang Yang, Baolong Liu, Huimin Yao, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.