Sciweavers

9218 search results - page 26 / 1844
» RFID Technology and Applications
Sort
View
CCS
2005
ACM
15 years 3 months ago
Untraceable RFID tags via insubvertible encryption
We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain u...
Giuseppe Ateniese, Jan Camenisch, Breno de Medeiro...
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
15 years 3 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson
CIT
2006
Springer
15 years 1 months ago
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanism...
Naval Bhandari, Anirudha Sahoo, Sridhar Iyer
COMCOM
2010
148views more  COMCOM 2010»
14 years 7 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran
SAINT
2006
IEEE
15 years 3 months ago
Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols
The performance of RFID anti-collision protocols that are based on framed ALOHA depends on a transmission scheme that controls access to the shared channel. In this paper, we outl...
Christian Floerkemeier, Matthias Wille