Sciweavers

191 search results - page 5 / 39
» Designing with RFID
Sort
View
PERCOM
2007
ACM
14 years 9 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
JCM
2008
57views more  JCM 2008»
13 years 10 months ago
An RF-ID Reader Using SAW Dispersive Delay Lines For Wideband Synchronisation
Abstract-- RF-ID systems are susceptible to frequency interference from other communciation systems particularly when the RF-ID tags transmit on a fixed carrier frequency. The RF-I...
Thomas M. McCoy, Paul V. Brennan, Richard J. Bullo...
PERCOM
2010
ACM
14 years 1 months ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing
IC3
2009
13 years 7 months ago
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup
In this paper we have worked out on some the complex modeling aspects such as Multi Scale modeling, MATLAB Sugar based modeling and have shown the complexities involved in the anal...
Rohit Pathak, Satyadhar Joshi
MOBICOM
2006
ACM
14 years 4 months ago
Collision avoidance in a dense RFID network
In this work, we develop a CSMA-based MAC protocol to avoid reader-reader and reader-tag collisions in a dense RFID network. The network is implemented using mote-based RFID reade...
Shweta Jain, Samir R. Das