Sciweavers

49 search results - page 2 / 10
» Visible and controllable RFID tags
Sort
View
ESORICS
2010
Springer
13 years 6 months ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
PERCOM
2006
ACM
14 years 5 months ago
Transmission control scheme for fast RFID object identification
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a co...
Christian Floerkemeier
SACMAT
2010
ACM
13 years 10 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
JTAER
2008
103views more  JTAER 2008»
13 years 5 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
NIME
2001
Springer
190views Music» more  NIME 2001»
13 years 10 months ago
Tangible Music Interfaces using Passive Magnetic Tags
The technologies behind passive resonant magneticallycoupled tags are introduced and their application as a musical controller is illustrated for solo or group performances, inter...
Joseph A. Paradiso, Kai-yuh Hsiao, Ari Y. Benbasat