Malware :RFID
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 3
Abstract
This paper presents various approaches and analysis that describes the terminology for RFID malware. There are various approaches used for RFID malware analysis and still lot of work is going on in this direction. Our purpo this paper is to analyse the various basic terms and approaches that have been introduced in this particular domain
Authors and Affiliations
Ankur Singh Bist
TENSILE STRENGTH OF WELDED MILD STEEL SPECIMEN ON UNIVERSAL TESTING MACHINE
The aim of my paper is to find the various properties of mild steel specimen which is welded by mainly three welding . Quality and productivity play important role in today’s manufacturing market. Now a day’s due...
IMPLEMENTATION OF ZIGBEE( 802.15.4) FOR DATA LOGGER
The aim of this dissertation is to provide data logger for remote system. It consists of a temperature sensor for constantly monitoring temperature and Zigbee module for wireless data transfer. The measured temperatu...
Improvements of Steganography Parameter in Binary Images and JPEG Images against Steganalysis
Steganography is a science of hiding messages into multimedia documents. A message can be hidden in a document only if the content of a document has high redundancy. Although the embedded message changes the characteri...
A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE WITH KEY AGGREGATE SEARCHABLE ENCRYPTION
Cloud is a new way to store large amount of data. In cloud computing, data owners host their data on cloud servers and users can access the data from cloud servers. By data outsourcing, users can be relieved from...
Automatic Optical Inspection System Design for Tell-Tale Clusters in Automobiles UsinG LabVIEW
Automatic Optical Inspection (AOI) of tell-tale instrument clusters is the extensively researched area in automobile industries due to its simplicity in inspection line and its reliability. The main objective of o...