Sciweavers

9218 search results - page 40 / 1844
» RFID Technology and Applications
Sort
View
WISTP
2009
Springer
15 years 4 months ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic
CAISE
2004
Springer
15 years 3 months ago
Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm
Abstract. Ubiquitous Mobile Systems (UMSs) allow for automated capturing of events. Both mobility and ubiquity are supported by electronic means such as mobile phones and PDAs and ...
Ana Karla A. de Medeiros, Boudewijn F. van Dongen,...
IACR
2011
292views more  IACR 2011»
13 years 9 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
WWW
2004
ACM
15 years 10 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
KES
2006
Springer
14 years 9 months ago
Robust Positioning a Mobile Robot with Active Beacon Sensors
With the development of service robots and with the emerging concept of the ubiquitous world, localization of a mobile robot has become a popular issue. Even though several localiz...
JaeMu Yun, SungBu Kim, JangMyung Lee