Sciweavers

9218 search results - page 29 / 1844
» RFID Technology and Applications
Sort
View
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
15 years 4 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
RFIDSEC
2010
14 years 4 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
JTAER
2007
101views more  JTAER 2007»
14 years 9 months ago
The National Livestock Identification System: The Importance of Traceability in E-Business
This paper aims to explore how Radio Frequency Identification (RFID) can be utilized on dairy farms to enhance total farm management. There is a growing worldwide trend for countr...
Adam Trevarthen
GIS
2008
ACM
15 years 11 months ago
Autonomous navigation of mobile agents using RFID-enabled space partitions
Existing techniques for autonomous indoor navigation are often environment-specific and thus limited in terms of their applicability. In this paper, we take a fundamentally differ...
Muhammad Atif Mehmood, Lars Kulik, Egemen Tanin