-
VS
说明: RFID DEMO UHF FOR READERS OVER SERIAL PORT
- 2019-05-23 08:16:33下载
- 积分:1
-
FM0_Decode
双相间隔码解码(FM0)的C语言实现,应用于RFID领域,基于ISO.IEC_18000-6C协议。(The realization of FM0_Decode with c language.)
- 2021-04-11 20:18:57下载
- 积分:1
-
qencode
LDPC中的q进制编码算法,已经通过,由m语言也有c语言(Q in M-ary LDPC coding algorithm, has been passed by the m language also has c language)
- 2008-04-07 15:19:57下载
- 积分:1
-
RFID 读卡器 读取卡信息DEMO
RFID 读卡器 读取卡信息DEMO
- 2022-02-26 07:03:43下载
- 积分:1
-
pcf8814
New RFID Chip Datasheet
- 2013-10-13 15:19:44下载
- 积分:1
-
Mifare_One_S50
Mifare One S50射频卡的英文资料,对做RFID方面的人有用(Mifare One S50 RF cards in English information on the RFID side of the people to do useful)
- 2008-03-11 09:25:05下载
- 积分:1
-
MSP430与超高频扫描模块简单通信程序
RFID超高频扫描模块通过串口与单片机连接,使用用户手册中提供控制指令进行编程,对RFID扫描模块进行简单控制,实现扫描模块的自动扫描,可控制扫描周期,只需修改延迟时间,同时通过LCD12864进行显示···· (提供扫描模块用户手册)
- 2022-03-06 05:46:23下载
- 积分:1
-
3833.Desfire ev1 t commands
说明: Desfire ev1 t commands + authentication process
- 2019-04-23 08:27:45下载
- 积分:1
-
射频识别技术是自动识别技术…
无线射频识别技术(RFID)是自动识别技术的一种高级形式。随着信息化技术的不断发展,无线射频识别技术(RFID)的应用也越来越广泛。本书主要介绍了无线射频识别技术的基本工作原理和具体应用,并列举了大量的应用实例,如动物识别管理、配送中心管理、矿井管理、停车场管理、军事物流运用等-Radio frequency identification technology (RFID) is the automatic identification of an advanced form of technology. As information technology continues to develop, radio frequency identification technology (RFID) applications are increasingly widespread. This book introduces the radio frequency identification technology, the basic working principles and specific applications, and listed a large number of application examples, such as animal identification management, distribution center management, mine management, car park management, the use of military logistics
- 2022-09-24 22:25:03下载
- 积分:1
-
In this paper, we first propose a cryptographic
authentication protocol which...
RFID系统的IEEE的文章,安全协议,认证-
In this paper, we first propose a cryptographic
authentication protocol which meets the privacy
protection for tag bearers, and then a digital Codec for
RFID tag is designed based on the protocol. The
protocol which uses cryptographic hash algorithm is
based on a three-way challenge response
authentication scheme.
In addition, we will show how the three different
types of protocol frame formats are formed by
extending the ISO/IEC 18000-3 standard[3] for
implementing the proposed authentication protocol in
RFID system environment. The system has been
described in Verilog HDL and also synthesized using
Synopsys Design Compiler with Hynix 0.25 µ m
standard-cell library. From implementation results, we
found that the proposed scheme is well suite to
implement robust RFID system against active attacks
such as the man-in-the-middle attack.
- 2022-01-28 10:53:49下载
- 积分:1