RFID Enabled Secure Certificate
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 107

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015

RFID Enabled Secure Certificate

Sonali Singh

Fake degrees is a menace to the society and threat to integrity of both the certificate holder and educational institution that has awarded the certificate. For this it has been tried to implement a RFID based security system for the certificates that ensures security of information and authenticity of the certificate issued. In this we are trying to encrypt the data at time of transmission using PC-MAC-AES Algorithm for security and used MHRD a 3rd party verifier that collaboration with both university and the organization that need to verify the degree. For this a RFID tag is fabricated with the degree and this will be read by using RFID reader

Keywords: RFID, TAG, READER, PC-MAC-AES, MHRD, Authentication, Verification

Edition: Volume 4 Issue 5, May 2015

Pages: 1910 - 1915

Share this Article

How to Cite this Article?

Sonali Singh, "RFID Enabled Secure Certificate", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154626, Volume 4 Issue 5, May 2015, 1910 - 1915

Enter Your Email Address




Similar Articles with Keyword 'RFID'

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1292 - 1296

Proposed Concept for Ontology Communication between IOT Devices

Vinod Kumar Shukla, Dr. D.B. Ojha

Share this Article

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2180 - 2182

Review of Improved Cross Redundant Data Cleaning Algorithm for RFID and WSN Integration

Jayashri M. Dupare, N. U. Sambhe

Share this Article

Similar Articles with Keyword 'TAG'

Downloads: 153

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Similar Articles with Keyword 'READER'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Downloads: 105 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1164 - 1169

A Survey on Scalable Big Data Analytics Platform

Ravindra Phule, Madhav Ingle

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Verification'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article



Top