Sciweavers

286 search results - page 9 / 58
» An Introduction to RFID Technology
Sort
View
AFRICACRYPT
2010
Springer
14 years 3 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
APWEB
2010
Springer
13 years 11 months ago
Multiple Continuous Queries Optimization for Processing RFID Streaming Data
This paper investigates the problem of processing multiple continuous queries over RFID streaming data in RFID middleware. RFID middleware collects and filters RFID sensing data wh...
Haipeng Zhang, Wooseok Ryu, Yongxu Piao, Bonghee H...
HCI
2009
13 years 6 months ago
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology
This paper presents a new kind of interaction between users and a tabletop. The table described is interactive and associated with tangible and traceable objects using RFID technol...
Sébastien Kubicki, Sophie Lepreux, Yoann Le...
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
14 years 2 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
ESAS
2007
Springer
14 years 2 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...