Sciweavers

191 search results - page 24 / 39
» Designing with RFID
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
14 years 4 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...
MHCI
2009
Springer
14 years 4 months ago
Improving the accessibility of NFC/RFID-based mobile interaction through learnability and guidance
NFC and RFID technologies have found their way into current mobile phones and research has presented a variety of applications using NFC/RFID tags for interaction between physical...
Gregor Broll, Susanne Keck, Paul Holleis, Andreas ...
PERVASIVE
2007
Springer
14 years 4 months ago
Explorations and Experiences with Ambient Information Systems
We have developed a series of ambient information systems and used each in our research lab for extended periods of time. The systems use technologies such as RFID, RSS, and Phidg...
John T. Stasko, Myungcheol Doo, Brian Dorn, Christ...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 1 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...