Sciweavers

98 search results - page 17 / 20
» Securing RFID Systems by Detecting Tag Cloning
Sort
View
137
Voted
KES
2005
Springer
15 years 9 months ago
Position Estimation for Goods Tracking System Using Mobile Detectors
Abstract. Determining physical location of indoor objects is one of the key issues in ubiquitous computing. Although there are many proposals to provide physical location tracking,...
Hiroshi Mineno, Kazuo Hida, Miho Mizutani, Naoto M...
166
Voted
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 10 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
111
Voted
TEI
2010
ACM
131views Hardware» more  TEI 2010»
15 years 10 months ago
SOPHYA: a system for digital management of ordered physical document collections
In recent years several systems have been developed to integrate the management of physical and digital documents and artefacts. These systems, which often rely on technologies su...
Matthew Jervis, Masood Masoodian
150
Voted
IEEEIA
2009
15 years 1 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
144
Voted
PETRA
2010
ACM
15 years 2 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...