Sciweavers

42 search results - page 2 / 9
» The Practicality of Multi-Tag RFID Systems
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
Efficient Continuous Scanning in RFID Systems
RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous sca...
Bo Sheng, Qun Li, Weizhen Mao
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Model of Antecedents of RFID Adoption Intention in the Supply Chain
The application of the Radio Frequency Identification (RFID) technology in the supply chain has experienced increased attention in academic research and practice. There is, howeve...
Maria Madlberger
PERCOM
2007
ACM
14 years 7 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
JNCA
2011
185views more  JNCA 2011»
13 years 2 months ago
Design of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Gerhard P. Hancke
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...