Sciweavers

35 search results - page 1 / 7
» Architecting RFID Middleware
Sort
View
INTERNET
2006
140views more  INTERNET 2006»
13 years 4 months ago
Architecting RFID Middleware
Joseph E. Hoag, Craig W. Thompson
GI
2005
Springer
13 years 10 months ago
RFID middleware design - addressing both application needs and RFID constraints
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
Christian Floerkemeier, Matthias Lampe
ITNG
2006
IEEE
13 years 10 months ago
Contextual Events Framework in RFID System
Radio Frequency Identification (RFID) technology is considered to be the next step in the revolution of supplychain management, retail, and beyond. To derive real benefit from RFI...
Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom
PERCOM
2006
ACM
14 years 4 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
PERCOM
2006
ACM
14 years 4 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...