Sciweavers

2363 search results - page 31 / 473
» How Secure is RFID
Sort
View
BIOWIRE
2007
Springer
15 years 10 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
E4MAS
2005
Springer
15 years 9 months ago
Augmenting the Physical Environment Through Embedded Wireless Technologies
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
CSFW
2010
IEEE
15 years 7 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
IACR
2011
182views more  IACR 2011»
14 years 3 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
AAAI
2004
15 years 5 months ago
A Robotic Wayfinding System for the Visually Impaired
We present an emerging indoor assisted navigation system for the visually impaired. The core of the system is a mobile robotic base with a sensor suite mounted on it. The sensor s...
Vladimir A. Kulyukin, Chaitanya Gharpure, Pradnya ...