id author title date pages extension mime words sentences flesch summary cache txt work_6ymfcev3qva5lpd4wvsschrfkm Jianfang Yang Application of Chaotic Encryption in RFID Data Transmission Security 2019 7 .pdf application/pdf 3617 327 57 Application of Chaotic Encryption in RFID Data generated by the chaotic map is used to encrypt the data chaotic sequences, the information of each electronic tag is encrypted with a unique chaotic sequence. data, and a security model based on chaotic encryption paper is mainly to use Logistic chaotic map to generate chaotic sequences to encrypt the data transmitted CHAOTIC SEQUENCE ENCRYPTS RFID parameter value required for chaotic mapping in the data information of each tag uses a unique chaotic generated by the chaotic map is the real field value, and general encryption process of Logistic chaotic map. Parameter value calculation process: In the RFID After the chaotic encryption sequence is transmission are all chaotically encrypted data, and the Read and write control mechanism after chaotic encryption. uses the chaotic encryption sequence generated by the Logistic chaotic map to encrypt the data transmitted by Encryption Based RFID System Information Security[J]. ./cache/work_6ymfcev3qva5lpd4wvsschrfkm.pdf ./txt/work_6ymfcev3qva5lpd4wvsschrfkm.txt