Sciweavers

286 search results - page 19 / 58
» An Introduction to RFID Technology
Sort
View
JCM
2007
143views more  JCM 2007»
13 years 8 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
DEXA
2007
Springer
96views Database» more  DEXA 2007»
14 years 2 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...
RFIDSEC
2010
13 years 3 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
SIGMOD
2008
ACM
147views Database» more  SIGMOD 2008»
14 years 8 months ago
A demonstration of Cascadia through a digital diary application
The Cascadia system provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID ...
Christopher Ré, Dan Suciu, Evan Welbourne, ...
CORR
2006
Springer
186views Education» more  CORR 2006»
13 years 8 months ago
SASE: Complex Event Processing over Streams
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of dat...
Daniel Gyllstrom, Eugene Wu 0002, Hee-Jin Chae, Ya...