Sciweavers

191 search results - page 26 / 39
» Designing with RFID
Sort
View
CIKM
2006
Springer
14 years 1 months ago
A data stream language and system designed for power and extensibility
By providing an integrated and optimized support for user-defined aggregates (UDAs), data stream management systems (DSMS) can achieve superior power and generality while preservi...
Yijian Bai, Hetal Thakkar, Haixun Wang, Chang Luo,...
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 6 months ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
EUSAI
2007
Springer
14 years 4 months ago
Improving Mobile Solution Workflows and Usability Using Near Field Communication Technology
Organisations want nowadays more controlled processes and easily usable solutions, but achieving them requires winning many challenges. Radio Frequency Identification (RFID) based ...
Päivi Jaring, Vili Törmänen, Erkki ...
PERVASIVE
2006
Springer
13 years 10 months ago
The Diet-Aware Dining Table: Observing Dietary Behaviors over a Tabletop Surface
We are what we eat. Our everyday food choices affect our long-term and short-term health. In the traditional health care, professionals assess and weigh each individual's diet...
Keng-hao Chang, Shih-yen Liu, Hao-Hua Chu, Jane Yu...
RFIDSEC
2010
13 years 8 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...