Design and implementation of an ebook access control protocol

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Electronic books have the advantages of being portable and low cost; however, there are drawbacks, such as they can be duplicated easily. This research designs and implements an eBook access control protocol and achieves authorized user access verification. This method includes network communication and RFID technique, mainly utilizing the feature of RFID tag that contains unique Tag ID, establishes a database of eBooks tag IDs on a Radius server, and allows access to these eBooks only by the user with legitimate RFID tag. This chapter presents function F() and F -1(), the inverse function of F(). The Radius server uses F() to encrypt and send the data to the RFID tag; besides, it also can decrypt the data sent from RFID tag. F -1() in the RFID tag can be used to decrypt and encrypt data to and from the Radius server. Furthermore, SSL over TCP/IP is applied to secure and protect data transfer between Radius server and eBook reader. © 2013 Springer Science+Business Media New York.

Cite

CITATION STYLE

APA

Liao, H. W., Wang, P. H., & Sheu, M. L. (2013). Design and implementation of an ebook access control protocol. In Lecture Notes in Electrical Engineering (Vol. 234 LNEE, pp. 667–673). https://doi.org/10.1007/978-1-4614-6747-2_77

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free