Sciweavers

1790 search results - page 44 / 358
» On Privacy Models for RFID
Sort
View
CN
2011
81views more  CN 2011»
14 years 6 months ago
Dynamic system model for optimal configuration of mobile RFID systems
Juan J. Alcaraz, Esteban Egea-López, Javier...
ISCAS
2005
IEEE
207views Hardware» more  ISCAS 2005»
15 years 5 months ago
A novel low-power input-independent MOS AC/DC charge pump
: This paper presents a novel fully integrated MOS AC to DC charge pump with low power dissipation and stable output for RFID applications. To improve the input sensitivity, we rep...
Yuan Yao, Yin Shi, Foster F. Dai
CSFW
2010
IEEE
15 years 3 months ago
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
—An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets’ behaviour, and so, threaten their privacy. In...
Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Rya...
SAC
2006
ACM
15 years 5 months ago
Making tuple spaces physical with RFID tags
In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea – rooted in a more general sc...
Marco Mamei, Renzo Quaglieri, Franco Zambonelli
PERCOM
2007
ACM
15 years 11 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...