Electronic books have the advantages of being portable and low cost; however, there are drawbacks, such as they can be duplicated easily. This research designs and implements an eBook access control protocol and achieves authorized user access verification. This method includes network communication and RFID technique, mainly utilizing the feature of RFID tag that contains unique Tag ID, establishes a database of eBooks tag IDs on a Radius server, and allows access to these eBooks only by the user with legitimate RFID tag. This chapter presents function F() and F -1(), the inverse function of F(). The Radius server uses F() to encrypt and send the data to the RFID tag; besides, it also can decrypt the data sent from RFID tag. F -1() in the RFID tag can be used to decrypt and encrypt data to and from the Radius server. Furthermore, SSL over TCP/IP is applied to secure and protect data transfer between Radius server and eBook reader. © 2013 Springer Science+Business Media New York.
CITATION STYLE
Liao, H. W., Wang, P. H., & Sheu, M. L. (2013). Design and implementation of an ebook access control protocol. In Lecture Notes in Electrical Engineering (Vol. 234 LNEE, pp. 667–673). https://doi.org/10.1007/978-1-4614-6747-2_77
Mendeley helps you to discover research relevant for your work.