Sciweavers

286 search results - page 31 / 58
» An Introduction to RFID Technology
Sort
View
NTMS
2008
IEEE
14 years 3 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
CSREASAM
2006
13 years 10 months ago
Do No Harm: The Use of RFID Tags in a Medical Environment
- With the increasing usage of RFID systems and their potential in a range of common applications especially medical related fields, it is important to investigate the weaknesses o...
Christopher Bolan
PETRA
2010
ACM
13 years 7 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
APWEB
2007
Springer
14 years 2 months ago
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags
How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and groupi...
Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan...
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
14 years 2 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter