Sciweavers

1790 search results - page 25 / 358
» On Privacy Models for RFID
Sort
View
GRC
2007
IEEE
15 years 6 months ago
Privacy in the Information and Communications Technologies
— Information and Communications Technologies (ICT) are fostering the appearance of a plethora of new services and applications. On the one hand, ICT will improve the efficiency...
Antoni Martínez-Ballesté, Agusti Sol...
JTAER
2008
103views more  JTAER 2008»
14 years 11 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
15 years 1 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
15 years 9 hour ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
IROS
2008
IEEE
135views Robotics» more  IROS 2008»
15 years 6 months ago
Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model
—We present a novel particle filter implementation for estimating the pose of tags in the environment with respect to an RFID-equipped robot. This particle filter combines sign...
Travis Deyle, Charles C. Kemp, Matthew S. Reynolds