Sciweavers

385 search results - page 77 / 77
» Multi-tag RFID systems
Sort
View
EUC
2005
Springer
13 years 10 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
IPSN
2005
Springer
13 years 10 months ago
Lazy inference on object identities in wireless sensor networks
Tracking the identities of moving objects is an important aspect of most multi-object tracking applications. Uncertainty in sensor data, coupled with the intrinsic difficulty of ...
Jaewon Shin, Nelson Lee, Sebastian Thrun, Leonidas...
GI
2008
Springer
13 years 6 months ago
A Novel Conceptual Model for Accessing Distributed Data and Applications, as well as Devices
: As data and services are increasingly distributed in the network, rather than stored in a fixed location, one can imagine a scenario in which the Personal Computer, intended as a...
Lucia Terrenghi, Thomas Lang
CEE
2007
110views more  CEE 2007»
13 years 5 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
GI
2007
Springer
13 years 11 months ago
Ubiquitous Computing, Pervasive Computing, Ambient Intelligence - Surveillance and Control?
Abstract: Sowohl im praktischen Diskurs von Bürgerrechtsvertretern und Datenschützern wie auch in theoretisch ausgerichteten Debatten werden Ausdrücke wie Ubiquitous Computing, ...
Michael Nagenborg, Karsten Weber