• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 559
Next 10 →

Abstract A Platform for RFID Security and Privacy Administration

by Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a stan ..."
Abstract - Add to MetaCart
standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID

A platform for RFID security and privacy administration

by Georgi N. Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman - In Proceedings of the 20th Conference on Large installation System Administration (Washington, DC, December 03 - 08, 2006). USENIX Association , 2006
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID read ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
reader with unique RFID tag emulation capabilities. Our system provides a platform for both automated and coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID

Bridging Physical and Virtual Worlds with Electronic Tags

by Roy Want, Kenneth P. Fishkin, Anuj Gujar, Beverly L. Harrison , 1999
"... The role of computers in the modern office has tended to split our activities between virtual interactions in the realm of the computer and physical interactions with real objects that have been part of the traditional office infrastructure. This paper discusses a variety of scenarios we have implem ..."
Abstract - Cited by 281 (7 self) - Add to MetaCart
associated with their form (e.g., a dictionary and a web-based translation service). Unlike previous work in this area, we have focused on uniquely combining four inexpensive technologies with off-the-shelf applications, everyday objects, and computational devices. KEYWORDS: RFID tag, ubiquitous computing

RFID TAGS

by Amritha Balach, Bharti Chauhan, Umesh Chauhan, Ashish Bokare
"... host the same on cloud. The main motive of the project is to provide full automation to the user. Enterprise resource planning (ERP) is a system that is commonly used in large industries to plan and utilize their resources properly, be it human resource or other inanimate resources. This ERP system ..."
Abstract - Add to MetaCart
and teacher- student chat system.RFID (Radio Frequency Identification) can be thought of as a part of AIDC (Automatic Identification and Data Capture). AIDC is a technique to assign unique identifications to the products in an enterprise. This can be integrated with the ERP system for attendance purposes

"Yoking-Proofs" for RFID Tags

by Ari Juels
"... RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility in automating supply-chain logistics, RFID tags promise eventually to supplant the optical barcode as a means of identifyi ..."
Abstract - Cited by 59 (4 self) - Add to MetaCart
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility in automating supply-chain logistics, RFID tags promise eventually to supplant the optical barcode as a means

Cryptographic Approach to "Privacy-Friendly" Tags

by Miyako Ohkubo , Koutarou Suzuki, Shingo Kinoshita - IN RFID PRIVACY WORKSHOP , 2003
"... Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are a#xed to everyday items, they may be used to support various useful services. However, widespread deployment of RFID tags may create new threats to user privacy, due ..."
Abstract - Cited by 146 (1 self) - Add to MetaCart
Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are a#xed to everyday items, they may be used to support various useful services. However, widespread deployment of RFID tags may create new threats to user privacy

ABSTRACT Implementing Security in RFID systems: The “Tag Emulator”

by Manar El-chammas, Bassam El-khoury, Antoun Halaby
"... In this paper a novel and cost-efficient approach for implementing security in Radio-Frequency Identification systems (RFID) is put forth. Current systems incorporate security at a cost much higher than acceptable via methods such as the use of hashing functions, which lead to more complex and expen ..."
Abstract - Add to MetaCart
and expensive circuitry. The tag emulator enables secure communication by encapsulating tags that must be secured, and by appearing as tags when communicating with authorized readers. This allows information regarding tags to be available to a select set of readers, and remains within the limits set

RFID Tags Enabled by Flip Chip

by Ken Gilleo, Steve Corbett
"... We think of flip chip as a solution for better performance, high I/O or absolute size reduction. But a new and exciting technology is now emerging where the flip chip is the unique answer to extreme cost reduction in a very low I/O product, the RFID tag. RFIDs are Radio Frequency Identification syst ..."
Abstract - Add to MetaCart
We think of flip chip as a solution for better performance, high I/O or absolute size reduction. But a new and exciting technology is now emerging where the flip chip is the unique answer to extreme cost reduction in a very low I/O product, the RFID tag. RFIDs are Radio Frequency Identification

Textpresso: An Ontology-Based Information Retrieval and Extraction System for Biological Literature

by Hans-michael Müller, Eimear E. Kenny, Paul W. Sternberg - PLoS Biol , 2004
"... We have developed Textpresso, a new text-mining system for scientific literature whose capabilities go far beyond those of a simple keyword search engine. Textpresso’s two major elements are a collection of the full text of scientific articles split into individual sentences, and the implementation ..."
Abstract - Cited by 208 (14 self) - Add to MetaCart
We have developed Textpresso, a new text-mining system for scientific literature whose capabilities go far beyond those of a simple keyword search engine. Textpresso’s two major elements are a collection of the full text of scientific articles split into individual sentences, and the implementation

Emulation System for Active Tag Applications

by Razvan Beuran, Junya Nakata, Takashi Okada, Tetsuya Kawakami - Proc. of ISSNIP 2008
"... Abstract—In this paper we present an active tag emulation system that is used to carry out live experiments with active tag applications. Its two main components are the wireless communication emulator QOMET, and an active tag processor emulator. Experiments are performed using the experiment-suppor ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
is used during the development of the pedestrian localization system so as to perform a wide range of experiments easily and in a repeatable manner. Keywords-emulation, active RFID tags, pedestrian localization I.
Next 10 →
Results 1 - 10 of 559
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University