Sciweavers

385 search results - page 41 / 77
» Multi-tag RFID systems
Sort
View
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 1 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
FC
2005
Springer
133views Cryptology» more  FC 2005»
14 years 1 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
ICISC
2007
102views Cryptology» more  ICISC 2007»
13 years 9 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
VLDB
2004
ACM
101views Database» more  VLDB 2004»
14 years 1 months ago
HiFi: A Unified Architecture for High Fan-in Systems
Advances in data acquisition and sensor technologies are leading towards the development of “High Fan-in” architectures: widely distributed systems whose edges consist of nume...
Owen Cooper, Anil Edakkunni, Michael J. Franklin, ...
DUX
2007
13 years 11 months ago
180 x 120: designing alternate location systems
Using 180 RFID tags to track and plot locations over time, guests to an event at the San Francisco Museum of Modern Art (SFMOMA) collectively constructed a public visualization of...
Eric Paulos, Anthony Burke, Tom Jenkins, Karen Mar...