Sciweavers

IJIPT
2007
91views more  IJIPT 2007»
13 years 4 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins
IJIPT
2007
78views more  IJIPT 2007»
13 years 4 months ago
If objects could talk: a novel resource discovery approach for pervasive environments
: We propose to extend standard Radio Frequency IDentification (RFID) usage by storing semantically annotated data within RFID tags memory, so that objects may actually ‘describ...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...
SIGMOBILE
2008
72views more  SIGMOBILE 2008»
13 years 4 months ago
RFID-based networks: exploiting diversity and redundancy
In this article, we outline a research agenda for developing protocols and algorithms for densely populated RFID based systems covering a wide geographic area. This will need mult...
Nitin Vaidya, Samir R. Das
JSAC
2006
100views more  JSAC 2006»
13 years 4 months ago
RFID security and privacy: a research survey
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help iden...
Ari Juels
JTAER
2008
82views more  JTAER 2008»
13 years 4 months ago
Effects of the RFID Mandate on Supply Chain Management
Recently, radio frequency identification (RFID) is being explored as a technology to be used in supply chain management. The use of RFID in the supply chain is an emerging technol...
Chin-Boo Soon, Jairo A. Gutiérrez
JTAER
2008
105views more  JTAER 2008»
13 years 4 months ago
RFID as a Disruptive Innovation
The first part of the paper discusses Wal-Mart's adoption of RFID through the theoretical lens of the Resources, Processes, and Values (RPV) innovation theory. This part make...
Vlad Krotov, Iris A. Junglas
JSW
2008
122views more  JSW 2008»
13 years 4 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
JCM
2006
112views more  JCM 2006»
13 years 4 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 4 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
CORR
2006
Springer
186views Education» more  CORR 2006»
13 years 4 months ago
SASE: Complex Event Processing over Streams
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of dat...
Daniel Gyllstrom, Eugene Wu 0002, Hee-Jin Chae, Ya...