e-ISSN : 0975-4024 p-ISSN : 2319-8613   
CODEN : IJETIY    

International Journal of Engineering and Technology

Home
IJET Topics
Call for Papers 2021
Author Guidelines
Special Issue
Current Issue
Articles in Press
Archives
Editorial Board
Reviewer List
Publication Ethics and Malpractice statement
Authors Publication Ethics
Policy of screening for plagiarism
Open Access Statement
Terms and Conditions
Contact Us

ABSTRACT

ISSN: 0975-4024

Title : Transaction security in RFID Credit Card by Polynomial Arithmetic along with Euclidean Parameters
Authors : Rohit Sharma, Dr. Anuj Kumar Agarwal, Dr. P.K. Singh
Keywords : RFID Credit Card, Transaction Security, Polynomial Arithmetic, Euclidean Parameters
Issue Date : Aug-Sep 2015
Abstract :
The utilization of Radio Frequency Identification (RFID) innovation is becoming quickly crosswise over a wide range of commercial enterprises. Engineers apply the innovation not just in conventional applications, for example, resource or stock following, additionally in security administrations, electronic travel papers and RFID-inserted card. Be that as it may, RFID innovation additionally raises various concerns in regards to protection, security and law requirement. In the same way as other advances, ease Radio Frequency Identification (RFID) frameworks will get to be pervasive in our everyday lives when fastened to regular shopper things as "keen marks". While yielding extraordinary efficiency picks up, RFID frameworks may make new dangers to the security and protection of people or associations. For securing RFID exchange, the utilization of cryptographic calculation is on top. Be that as it may, these calculations are fragmented without the utilization of math. In this paper I will demonstrate how polynomial number-crunching and Euclidean parameters came to assume a important part for exchange security. Planning secure and proficient multivariate key cryptosystem keeps on being a testing territory of examination as of late. In this paper we introduce another technique for outlining effective multivariate key cryptosystem by defeating all the known assaults.
Page(s) : 1194-1199
ISSN : 0975-4024
Source : Vol. 7, No.4