Sciweavers

2363 search results - page 20 / 473
» How Secure is RFID
Sort
View
WISEC
2010
ACM
15 years 9 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
WISTP
2010
Springer
15 years 1 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
ECEH
2006
168views Healthcare» more  ECEH 2006»
15 years 5 months ago
Building a Smart Hospital using RFID Technologies
: Technologies of identification by radio frequencies (RFID) experience a fast development and healthcare is predicted to be one of its major growth areas. After briefly introducin...
Patrik Fuhrer, Dominique Guinard
96
Voted
UIC
2007
Springer
15 years 10 months ago
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon's Needle
Surface-embedded passive radio frequency (PRF) exteroception is a method whereby an action to be executed by a mobile unit is selected through a signal received from a surface-embe...
Vladimir A. Kulyukin, Aliasgar Kutiyanawala, Mingh...
128
Voted
DSN
2007
IEEE
15 years 10 months ago
Reliability Techniques for RFID-Based Object Tracking Applications
Radio Frequency Identification (RFID) technology has the potential to dramatically improve numerous industrial practices. However, it still faces many challenges, including secur...
Ahmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittw...