Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
RFID Enabled Secure Certificate
Fake degrees is a menace to the society and threat to integrity of both the certificate holder and educational institution that has awarded the certificate. For this it has been tried to implement a RFID based security system for the certificates that ensures security of information and authenticity of the certificate issued. In this we are trying to encrypt the data at time of transmission using PC-MAC-AES Algorithm for security and used MHRD a 3rd party verifier that collaboration with both university and the organization that need to verify the degree. For this a RFID tag is fabricated with the degree and this will be read by using RFID reader
Keywords: RFID, TAG, READER, PC-MAC-AES, MHRD, Authentication, Verification
Edition: Volume 4 Issue 5, May 2015
Pages: 1910 - 1915
How to Cite this Article?
Sonali Singh, "RFID Enabled Secure Certificate", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154626, Volume 4 Issue 5, May 2015, 1910 - 1915
Similar Articles with Keyword 'RFID'
Proposed Concept for Ontology Communication between IOT Devices
Vinod Kumar Shukla, Dr. D.B. Ojha
Review of Improved Cross Redundant Data Cleaning Algorithm for RFID and WSN Integration
Jayashri M. Dupare, N. U. Sambhe
Similar Articles with Keyword 'TAG'
Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
A Survey of Generating Multi-Document Summarizations
Patil Ajita S., P. M. Mane
Similar Articles with Keyword 'READER'
A Comprehensive Study of Elasticsearch
Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu
A Survey on Scalable Big Data Analytics Platform
Ravindra Phule, Madhav Ingle
Similar Articles with Keyword 'Authentication'
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'Verification'
Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S