Sciweavers

193 search results - page 4 / 39
» Physical Access Control for Captured RFID Data
Sort
View
VLDB
1999
ACM
89views Database» more  VLDB 1999»
15 years 4 months ago
Physical Data Independence, Constraints, and Optimization with Universal Plans
We present an optimization method and algorithm designed for three objectives: physical data independence, semantic optimization, and generalized tableau minimization. The method ...
Alin Deutsch, Lucian Popa, Val Tannen
MOBICOM
2010
ACM
15 years 17 days ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
86
Voted
WISA
2009
Springer
15 years 7 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
116
Voted
IJISEC
2010
121views more  IJISEC 2010»
14 years 10 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
93
Voted
GW
2005
Springer
119views Biometrics» more  GW 2005»
15 years 5 months ago
Dynamic Control of Captured Motions to Verify New Constraints
Simulating realistic human-like figures is still a challenging task when dynamics is involved. For example, making a virtual human jump to a given position requires to control the...
Carole Durocher, Franck Multon, Richard Kulpa