Sciweavers

385 search results - page 17 / 77
» Multi-tag RFID systems
Sort
View
127
Voted
PERCOM
2006
ACM
16 years 3 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
168
Voted
TCOM
2010
162views more  TCOM 2010»
14 years 10 months ago
RFID Reader Receivers for Physical Layer Collision Recovery
Abstract--Arbitration and scheduling of multiple tags in stateof-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently...
Christoph Angerer, Robert Langwieser, Markus Rupp
150
Voted
APWEB
2010
Springer
15 years 6 months ago
Multiple Continuous Queries Optimization for Processing RFID Streaming Data
This paper investigates the problem of processing multiple continuous queries over RFID streaming data in RFID middleware. RFID middleware collects and filters RFID sensing data wh...
Haipeng Zhang, Wooseok Ryu, Yongxu Piao, Bonghee H...
160
Voted
AFRICACRYPT
2010
Springer
15 years 10 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
JCS
2011
87views more  JCS 2011»
14 years 10 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke