Sciweavers

36 search results - page 7 / 8
» An Efficient Tree-Based Tag Identification Protocol for RFID...
Sort
View
TII
2008
132views more  TII 2008»
13 years 5 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
ACSAC
2009
IEEE
14 years 7 days ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
PERCOM
2009
ACM
14 years 6 months ago
RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation
Abstract--The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the deve...
Vikram P. Munishwar, Shailendra Singh 0003, Christ...
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 6 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
GIS
2008
ACM
14 years 6 months ago
Autonomous navigation of mobile agents using RFID-enabled space partitions
Existing techniques for autonomous indoor navigation are often environment-specific and thus limited in terms of their applicability. In this paper, we take a fundamentally differ...
Muhammad Atif Mehmood, Lars Kulik, Egemen Tanin