Hsi-Wen Wang

Learn More
In this paper, an active RFID system integrated public key encryption, embedded computation, and wireless communication technology that is implemented with cryptography and authentication mechanisms. In the system, a secure RFID Tag intermittently transmits cipher text to a RFID Reader which then transmits to a back-end platform to perform data comparison(More)
Radio frequency identification (RFID) systems have recently been used in a large number of applications. Security and privacy issues have also imposed significant challenges on these systems. Cryptography and authentication protocols have been utilized to effectively solve the security and privacy problems in RFID systems. In this paper, we integrate public(More)
  • 1