Results 1 - 10
of
1,799
Abstract A Platform for RFID Security and Privacy Administration
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a stan ..."
Abstract
- Add to MetaCart
standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID
A platform for RFID security and privacy administration
- In Proceedings of the 20th Conference on Large installation System Administration (Washington, DC, December 03 - 08, 2006). USENIX Association
, 2006
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID read ..."
Abstract
-
Cited by 20 (0 self)
- Add to MetaCart
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID
The lexical nature of syntactic ambiguity resolution
- Psychological Review
, 1994
"... Ambiguity resolution is a central problem in language comprehension. Lexical and syntactic ambiguities are standardly assumed to involve different types of knowledge representations and be resolved by different mechanisms. An alternative account is provided in which both types of ambiguity derive fr ..."
Abstract
-
Cited by 557 (24 self)
- Add to MetaCart
for a theory of language compre- third section we consider processing issues: how information is hension is to explain how the reader or listener copes with a processed within the mental lexicon and how contextual inforpervasive ambiguity problem. Languages are structured at mation can influence
RFID security and privacy: A research survey
- ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008
, 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract
-
Cited by 353 (6 self)
- Add to MetaCart
, and treats the social and technical context of their work. While geared toward the nonspecialist, the survey may also serve as a reference for specialist readers. Index Terms—Authentication, cloning, counterfeiting, electronic product code (EPC), privacy, radio frequency identification (RFID), security. I.
Multiple Object Identification with Passive RFID Tags
, 2002
"... We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use this m ..."
Abstract
-
Cited by 177 (0 self)
- Add to MetaCart
We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use
Synchronization of RFID Readers for Dense RFID Reader Environments
- in Proceedings of the RFID and the Extended Network Workshop at SAINT 2006
, 2006
"... For a dense RFID reader deployment, such as in warehouse RFID deployment, where hundreds of antennas will be positioned in a building, the interference between all these readers must be studied carefully to avoid severe reader collisions. Strict RFID regulations and standards have been imposed, tryi ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
For a dense RFID reader deployment, such as in warehouse RFID deployment, where hundreds of antennas will be positioned in a building, the interference between all these readers must be studied carefully to avoid severe reader collisions. Strict RFID regulations and standards have been imposed
Privacy and Security in Library RFID -- Issues, Practices, and Architectures
, 2004
"... We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury, speed patron self-che ..."
Abstract
-
Cited by 141 (0 self)
- Add to MetaCart
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury, speed patron self
Mapping and localization with rfid technology
- In Proceedings of ICRA’05
, 2004
"... Fig. 1. Typical RFID tags used to label objects. The size of the tag depicted in the center is 11 × 5 cm. Abstract — In this paper we analyze whether recent Radio Frequency Identification (RFID) technology can be used to improve the localization of mobile robots and persons in their environment. In ..."
Abstract
-
Cited by 111 (2 self)
- Add to MetaCart
. In particular we study the problem of localizing RFID tags with a mobile platform that is equipped with a pair of RFID antennas. We present a probabilistic measurement model for RFID readers that allow us to accurately localize RFID tags in the environment. We also demonstrate how such maps can be used
Minimalist Cryptography for Low-Cost RFID Tags
, 2003
"... A radio-frequency identification (RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, o#ering a viable and powerful replacement for barc ..."
Abstract
-
Cited by 127 (6 self)
- Add to MetaCart
A radio-frequency identification (RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, o#ering a viable and powerful replacement
Adaptive splitting protocols for RFID tag collision arbitration
- In MobiHoc
, 2006
"... Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless channel. When multiple tags simultaneously transmit their IDs to a reader, the tag signals collide and this collision dist ..."
Abstract
-
Cited by 46 (2 self)
- Add to MetaCart
disturbs the reader’s identification process. Therefore, tag collision arbitration for passive RFID tags is a significant issue for fast identification. This paper presents two adaptive tag anti-collision protocols, an Adaptive Query Splitting protocol (AQS), which is an improvement on the query tree
Results 1 - 10
of
1,799