• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,799
Next 10 →

Abstract A Platform for RFID Security and Privacy Administration

by Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a stan ..."
Abstract - Add to MetaCart
standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID

A platform for RFID security and privacy administration

by Georgi N. Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman - In Proceedings of the 20th Conference on Large installation System Administration (Washington, DC, December 03 - 08, 2006). USENIX Association , 2006
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID read ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID

The lexical nature of syntactic ambiguity resolution

by Maryellen C Macdonald, Neal J Pearlmutter, Mark S Seidenberg - Psychological Review , 1994
"... Ambiguity resolution is a central problem in language comprehension. Lexical and syntactic ambiguities are standardly assumed to involve different types of knowledge representations and be resolved by different mechanisms. An alternative account is provided in which both types of ambiguity derive fr ..."
Abstract - Cited by 557 (24 self) - Add to MetaCart
for a theory of language compre- third section we consider processing issues: how information is hension is to explain how the reader or listener copes with a processed within the mental lexicon and how contextual inforpervasive ambiguity problem. Languages are structured at mation can influence

RFID security and privacy: A research survey

by Ari Juels - ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008 , 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract - Cited by 353 (6 self) - Add to MetaCart
, and treats the social and technical context of their work. While geared toward the nonspecialist, the survey may also serve as a reference for specialist readers. Index Terms—Authentication, cloning, counterfeiting, electronic product code (EPC), privacy, radio frequency identification (RFID), security. I.

Multiple Object Identification with Passive RFID Tags

by Harald Vogt , 2002
"... We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use this m ..."
Abstract - Cited by 177 (0 self) - Add to MetaCart
We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use

Synchronization of RFID Readers for Dense RFID Reader Environments

by Kin Seong Leong, Mun Leng Ng, Alfio R. Grasso, Peter H. Cole - in Proceedings of the RFID and the Extended Network Workshop at SAINT 2006 , 2006
"... For a dense RFID reader deployment, such as in warehouse RFID deployment, where hundreds of antennas will be positioned in a building, the interference between all these readers must be studied carefully to avoid severe reader collisions. Strict RFID regulations and standards have been imposed, tryi ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
For a dense RFID reader deployment, such as in warehouse RFID deployment, where hundreds of antennas will be positioned in a building, the interference between all these readers must be studied carefully to avoid severe reader collisions. Strict RFID regulations and standards have been imposed

Privacy and Security in Library RFID -- Issues, Practices, and Architectures

by David Molnar, et al. , 2004
"... We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury, speed patron self-che ..."
Abstract - Cited by 141 (0 self) - Add to MetaCart
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury, speed patron self

Mapping and localization with rfid technology

by Dirk Hähnel, Wolfram Burgard - In Proceedings of ICRA’05 , 2004
"... Fig. 1. Typical RFID tags used to label objects. The size of the tag depicted in the center is 11 × 5 cm. Abstract — In this paper we analyze whether recent Radio Frequency Identification (RFID) technology can be used to improve the localization of mobile robots and persons in their environment. In ..."
Abstract - Cited by 111 (2 self) - Add to MetaCart
. In particular we study the problem of localizing RFID tags with a mobile platform that is equipped with a pair of RFID antennas. We present a probabilistic measurement model for RFID readers that allow us to accurately localize RFID tags in the environment. We also demonstrate how such maps can be used

Minimalist Cryptography for Low-Cost RFID Tags

by Ari Juels , 2003
"... A radio-frequency identification (RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, o#ering a viable and powerful replacement for barc ..."
Abstract - Cited by 127 (6 self) - Add to MetaCart
A radio-frequency identification (RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, o#ering a viable and powerful replacement

Adaptive splitting protocols for RFID tag collision arbitration

by Jihoon Myung - In MobiHoc , 2006
"... Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless channel. When multiple tags simultaneously transmit their IDs to a reader, the tag signals collide and this collision dist ..."
Abstract - Cited by 46 (2 self) - Add to MetaCart
disturbs the reader’s identification process. Therefore, tag collision arbitration for passive RFID tags is a significant issue for fast identification. This paper presents two adaptive tag anti-collision protocols, an Adaptive Query Splitting protocol (AQS), which is an improvement on the query tree
Next 10 →
Results 1 - 10 of 1,799
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University