期刊文献+

RFID在图书出版行业应用进展研究 被引量:2

Research on the Progress of RFID Application in Book Publishing Industry
下载PDF
导出
摘要 本文综述了全球图书出版行业中RFID发展现状;指出当前RFID技术在图书出版行业发展中遇到的问题,从印刷厂、出版社、书店、主管部门的层面对我国图书出版行业RFID应用提出了若干建议,为我国图书出版行业RFID应用的发展和研究提供参考。 This article summarizes the current status of RFID development in the global book publishing industry,points out the current problems encountered by RFID technology in the development of the book publishing industry,and proposes a number of RFID applications in China's book publishing industry at the level of printing houses,publishers,bookstores,and competent authorities.It is suggested to provide a reference for the development and research of RFID application in China's book publishing industry.
作者 李婷婷 朱磊 张媛 陈斐 刘书豪 LI Ting-ting;ZHU Lei;ZHANG Yuan;CHEN Fei;LIU Shu-hao(Beijing Institute of Graphic Communication,Beijing 102600,China)
机构地区 北京印刷学院
出处 《价值工程》 2020年第8期196-198,共3页 Value Engineering
关键词 图书 出版 RFID books publishing RFID
  • 相关文献

参考文献7

二级参考文献33

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7)
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2)
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008

共引文献92

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部