Sciweavers

121 search results - page 9 / 25
» Implementation and Usage of Radio Frequency Identification (...
Sort
View
IJLT
2010
115views more  IJLT 2010»
14 years 8 months ago
Computer supported ubiquitous learning environment for vocabulary learning
: Ubiquitous computing could help the organisation and the mediation of social interactions wherever and whenever these situations might occur. Using those technologies enables the...
Hiroaki Ogata, Chengjiu Yin, Moushir M. El-Bishout...
ITIIS
2008
135views more  ITIIS 2008»
14 years 9 months ago
Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment
The Radio Frequency IDentification (RFID) system is a contactless automatic identification system, which comprises readers and tags. In RFID systems, a reader collision occurs whe...
InChan Song, Xiao Fan, KyungHi Chang
PERCOM
2004
ACM
15 years 9 months ago
"Yoking-Proofs" for RFID Tags
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
Ari Juels
JCM
2006
86views more  JCM 2006»
14 years 9 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
RFIDSEC
2010
14 years 7 months ago
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensu...
Gildas Avoine, Benjamin Martin 0002, Tania Martin