Sciweavers

385 search results - page 12 / 77
» Multi-tag RFID systems
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
ICPADS
2010
IEEE
13 years 5 months ago
Utilizing RF Interference to Enable Private Estimation in RFID Systems
Counting or estimating the number of tags is crucial for RFID system. Researchers have proposed several fast cardinality estimation schemes to estimate the quantity of a batch of ...
Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo L...
ITIIS
2010
184views more  ITIIS 2010»
13 years 6 months ago
Class 4 Active RFID Multi-hop Relay System based on IEEE 802.15.4a Low-Rate UWB in Sensor Network
The low-rate (LR) UWB is a promising technology for the ubiquitous sensor network (USN) due to its extremely low power consumption and simple transceiver implementation. However t...
Hong Zhang, SungHyun Hong, KyungHi Chang
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
EXPERT
2010
85views more  EXPERT 2010»
13 years 6 months ago
Code-Centric RFID System Based on Software Agent Intelligence
Min Chen, Sergio González-Valenzuela, Qian ...