Sciweavers

2363 search results - page 16 / 473
» How Secure is RFID
Sort
View
WIS
2004
15 years 5 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
ESORICS
2008
Springer
15 years 5 months ago
User Privacy in Transport Systems Based on RFID E-Tickets
Abstract. Recently, operators of public transportation in many countries started to roll out electronic tickets (e-tickets). E-tickets offer several advantages to transit enterpris...
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachs...
114
Voted
IFIP
2009
Springer
15 years 1 months ago
How to Foresee and Capture the Effects of RFID Implementation
RFID technology is, according to both industry and academia, one of the most promising new technologies for improving logistics and manufacturing excellence this decade. This resea...
Kristin Hergot, Lars Skjelstad
ICEIS
2009
IEEE
15 years 10 months ago
RFID in the Supply Chain: How to Obtain a Positive ROI - The Case of Gerry Weber
Christoph Goebel, Christoph Tribowski, Oliver G&uu...
IJIPT
2007
91views more  IJIPT 2007»
15 years 3 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins