Sciweavers

9218 search results - page 10 / 1844
» RFID Technology and Applications
Sort
View
TWC
2008
170views more  TWC 2008»
14 years 9 months ago
Secure and Serverless RFID Authentication and Search Protocols
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID proto...
Chiu Chiang Tan, Bo Sheng, Qun Li
ISWC
2000
IEEE
15 years 2 months ago
Enabling Implicit Human Computer Interaction: A Wearable RFID-Tag Reader
Implicit human computer interaction is based on the concept of using user activity in the real world as input to computers. Implicit HCI can help to reduce the problem of user inp...
Albrecht Schmidt, Hans-Werner Gellersen, Christian...
JCM
2007
143views more  JCM 2007»
14 years 9 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
VLDB
2008
ACM
114views Database» more  VLDB 2008»
15 years 10 months ago
An adaptive RFID middleware for supporting metaphysical data independence
Abstract Sensor devices produce data that are unreliable, low-level, and seldom able to be used directly by applications. In this paper, we propose Metaphysical Data Independence (...
Shawn R. Jeffery, Michael J. Franklin, Minos N. Ga...
JCM
2007
101views more  JCM 2007»
14 years 9 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan