Sciweavers

HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
13 years 11 months ago
A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy
Purpose: Drawing from literature on innovation, strategy and culture the objective of this study is to explore the role of perceived potentials and perceived strategic importance ...
Stefanie Jahner, Jan Marco Leimeister, Uta Franzis...
ETFA
2008
IEEE
13 years 11 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz
AFRICACRYPT
2010
Springer
13 years 11 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
WASA
2009
Springer
93views Algorithms» more  WASA 2009»
13 years 11 months ago
Experimental Study on Mobile RFID Performance
Abstract. An increasing number of applications use RFID in their design, but there is a lack of understanding of how mobility affects RFID performance in these applications. Unlik...
Zhong Ren, Chiu Chiang Tan, Dong Wang, Qun Li
IROS
2009
IEEE
180views Robotics» more  IROS 2009»
13 years 11 months ago
Particle filter-based trajectory estimation with passive UHF RFID fingerprints in unknown environments
Abstract— In this paper we present a novel approach to estimating the trajectory of a robot by means of inexpensive passive RFID tags and odometry in unknown environments. We sho...
Philipp Vorst, Andreas Zell
IEEEIAS
2009
IEEE
13 years 11 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
PERVASIVE
2009
Springer
13 years 11 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
TEI
2009
ACM
103views Hardware» more  TEI 2009»
13 years 11 months ago
Designing with RFID
Radio Frequency Identification (RFID) is a wireless technology that is emerging in consumer products as a method for input and interaction. Although RFID is relatively well known ...
Einar Sneve Martinussen, Timo Arnall

0
posts
with
0
views
433profile views
rahul1782Student, PhD
MIT
rahul1782