Sciweavers

191 search results - page 9 / 39
» Designing with RFID
Sort
View
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 4 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
IJRFITA
2007
205views more  IJRFITA 2007»
13 years 10 months ago
2D localisation using SAW-based RFID systems: a single antenna approach
: This paper presents a novel Real-Time Localisation System (RTLS) based upon 2.45 GHz Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) systems. The system utilise...
Darmindra D. Arumugam, Vijayakrishnan Ambravaneswa...
SIGMOD
2008
ACM
147views Database» more  SIGMOD 2008»
14 years 10 months ago
A demonstration of Cascadia through a digital diary application
The Cascadia system provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID ...
Christopher Ré, Dan Suciu, Evan Welbourne, ...
ICDCS
2008
IEEE
14 years 4 months ago
How to Monitor for Missing RFID tags
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and effic...
Chiu Chiang Tan, Bo Sheng, Qun Li
DATE
2007
IEEE
125views Hardware» more  DATE 2007»
14 years 4 months ago
Simulation platform for UHF RFID
1 Developing modern integrated and embedded systems require well-designed processes to ensure flexibility and independency. These features are related to exchangeability of hardw...
Vojtech Derbek, Christian Steger, Reinhold Weiss, ...