RFID Based Exam Hall Maintenance System
暂无分享,去创建一个
[1] D. Wyld. Radio Frequency Identification , 2008 .
[2] Matthias Schumann,et al. RFID – Radio Frequency Identification , 2008, Informatik-Spektrum.
[4] Nai-Wei Lo,et al. Novel RFID Authentication Schemes for Security Enhancement and System Efficiency , 2007, Secure Data Management.
[5] Shamkant B. Navathe,et al. An Efficient Algorithm for Mining Association Rules in Large Databases , 1995, VLDB.
[6] Mikko Lehtonen,et al. From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .
[7] S. Sumathi,et al. Introduction to neural networks using MATLAB 6.0 , 2006 .
[8] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[9] C. M. Roberts,et al. Radio frequency identification (RFID) , 2006, Comput. Secur..
[10] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[11] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[12] Yang Xiao,et al. Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..
[13] J. Landt,et al. The history of RFID , 2005, IEEE Potentials.
[14] Karen Ka-Leung Moon,et al. RFID research: An academic literature review (1995–2005) and future research directions , 2008 .
[15] S Saeidi,et al. IEEE Transactions on Antennas and Propagation , 2018, IEEE Transactions on Antennas and Propagation.
[16] Gyanendra K. Verma,et al. A Digital Security System with Door Lock System Using RFID Technology , 2010 .
[17] Muhammad Ali Mazidi,et al. The 8051 Microcontroller and Embedded Systems : Using Assembly and C , 1999 .
[18] Kopparapu Srivatsa,et al. RFID & Mobile Fusion for Authenticated ATM Transaction , 2010 .
[19] Alex X. Liu,et al. PAP: A privacy and authentication protocol for passive RFID tags , 2009, Comput. Commun..