Sciweavers

2363 search results - page 42 / 473
» How Secure is RFID
Sort
View
PETRA
2010
ACM
15 years 2 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
INFOCOM
2010
IEEE
15 years 2 months ago
Counting RFID Tags Efficiently and Anonymously
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem...
Hao Han, Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhe...
ICASSP
2008
IEEE
15 years 10 months ago
Separation of overlapping RFID signals by antenna arrays
— Radio Frequency Identi cation (RFID) is a technology to wirelessly transmit the identity of tagged objects. For long-range (UHF) systems with multiple tags, the tag replies may...
Asli F. Mindikoglu, Alle-Jan van der Veen
SEC
2008
15 years 5 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
MDM
2007
Springer
154views Communications» more  MDM 2007»
15 years 10 months ago
Analysis of Security and Privacy Issues in RFID-Based Reference Point Systems
In this paper, we analyze security and privacy issues in RFID-based reference point systems, which seamlessly provide high resolution location information so as to enable innovati...
Oranat Sangratanachaikul, Leping Huang, Shin'ichi ...