期刊文献+

RFID技术在高校实验实训管理中的应用探索

Exploring the Application of RFID Technology in Experiment and Training Management in Higher Education
下载PDF
导出
摘要 该文提出了一种利用RFID技术在高等学校实验实训管理中的应用方式,其中利用了该技术的部分优势,对一些实验实训管理中存在的问题进行了优化解决。 This paper presents a mode of application of RFID technology in experimental training management in higher education,which uses some of the benefits of the technology and optimizes the solution of some problems in experiment and training management.
作者 王宇 WANG Yu(Shaanxi Radio & TV University,Xi'an 710068,China)
出处 《电脑知识与技术》 2011年第9期6180-6181,共2页 Computer Knowledge and Technology
关键词 RFID 实验实训 电子标签 RFID experiment and training electronic tag
  • 相关文献

参考文献3

二级参考文献31

  • 1何京玉.深度调查:寻找RFID应用天堂[N].计算机世界,2004.
  • 2EPC与物联网高层论坛办公室.RFID射频技术简介与应用分析[Z/OL].http:∥www.sina.net,2004.
  • 3黄昌宏.RFID无线射频识别标识系统的探讨(上)[J].印刷新訊,2003,(49):16-16.
  • 4Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 5Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 6Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 7Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 8Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 9Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 10Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84

共引文献263

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部