Sciweavers

2363 search results - page 59 / 473
» How Secure is RFID
Sort
View
AOSD
2004
ACM
15 years 9 months ago
What are the key issues for commercial AOP use: how does AspectWerkz address them?
AspectWerkz is a framework targeted towards dynamic aspectoriented programming (AOP) in commercial applications. Based on our experience designing and supporting AspectWerkz, we h...
Jonas Bonér
EUSAI
2007
Springer
15 years 10 months ago
Improving Mobile Solution Workflows and Usability Using Near Field Communication Technology
Organisations want nowadays more controlled processes and easily usable solutions, but achieving them requires winning many challenges. Radio Frequency Identification (RFID) based ...
Päivi Jaring, Vili Törmänen, Erkki ...
PERVASIVE
2007
Springer
15 years 10 months ago
Explorations and Experiences with Ambient Information Systems
We have developed a series of ambient information systems and used each in our research lab for extended periods of time. The systems use technologies such as RFID, RSS, and Phidg...
John T. Stasko, Myungcheol Doo, Brian Dorn, Christ...
WS
2005
ACM
15 years 10 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 4 months ago
The Privacy Coach: Supporting customer privacy in the Internet of Things
The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase c...
Gerben Broenink, Jaap-Henk Hoepman, Christian van ...