Sciweavers

1790 search results - page 18 / 358
» On Privacy Models for RFID
Sort
View
COMCOM
2011
14 years 6 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
IC3
2009
14 years 9 months ago
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup
In this paper we have worked out on some the complex modeling aspects such as Multi Scale modeling, MATLAB Sugar based modeling and have shown the complexities involved in the anal...
Rohit Pathak, Satyadhar Joshi
HUC
2009
Springer
15 years 4 months ago
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to recognize human activities. In our setting, everyday objects are instrumented with UHF RFID tags ca...
Michael Buettner, Richa Prasad, Matthai Philipose,...
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 6 months ago
A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy
Purpose: Drawing from literature on innovation, strategy and culture the objective of this study is to explore the role of perceived potentials and perceived strategic importance ...
Stefanie Jahner, Jan Marco Leimeister, Uta Franzis...
PERCOM
2009
ACM
15 years 6 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...