Sciweavers

IWRT
2008
109views Communications» more  IWRT 2008»
13 years 6 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
IWRT
2008
156views Communications» more  IWRT 2008»
13 years 6 months ago
A Ubiquitous Knowledge-based System to Enable RFID Object Discovery in Smart Environments
This paper presents an extended framework supported by a suitable dissemination protocol to enable ubiquitous Knowledge Bases (u-KBs) in pervasive RFID environments. A u-KB is a di...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...
IWRT
2008
13 years 6 months ago
Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard
Abstract. This paper addresses the evaluation of a passive RFID system under a continuous flow of tag arrivals and departures, for instance, in a conveyor belt installation. In suc...
Javier Vales-Alonso, M. Victoria Bueno-Delgado, Es...