نتایج جستجو برای: radio frequency identification

تعداد نتایج: 935469  

2015
Raluca Bunduchi Clara Weisshaar Alison U. Smart

The successful implementation of any innovation requires an understanding of its benefits and costs. This study examines the changes in the magnitude of costs and benefits associated with technology process innovation adoption as the innovation diffuses across different industries. Using RFID as an exemplar technology, the study shows that the magnitude of benefits and costs associated with tec...

2007
Shlomi Dolev Marina Kopeetsky Thomas Clouser Mikhail Nesterenko

CONTENTS 32.

2009
Antti Ropponen Matti Linnavuo Raimo Sepponen

In this paper, a low-frequency RFID location system based on a matrix of quad antennae placed under a floor surface is described. A prototype system was used for parameterisation and feasibility tests. The results show that it is possible to build a location system using floor quad antennae.

2007
Kentaro Fukuchi Yu Izawa Fusako Kusunoki

We developed a tangible entertainment system that enables to play video game with physical collectibles as game components. It consists of a capsule toy vending machine with LCD panel, capsule toys with embedded RFID tags, an RFID sensor board and a computer. Nowadays a huge amount of collectibles is sold: baseball cards, dollhouse miniatures, character figures, candy tins, and so on. Usually, ...

2010
Ting-You Wang Ting-Yen Wang Michael Buettner

Background RFIDs have almost become ubiquitous such that one can find RFID readers installed in almost any location. These RFIDs follow a well-established protocol, Fig. 1, that is built on the fact that the RFID tags perform very simple processing that require very little power. Thus, the RFID tags do not have to perform any complex storage of energy and it is assumed it can perform all of the...

2015
Benjamin Khoo Peter Harris Stephen Hartman

Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the i...

2012
Mathias Morbitzer

The MIFARE Classic is the most popular RFID chip, used in public transport as well as cafeterias and other applications. This paper gives an overview of which methods were used to re-engineer the chips, from polishing to analyzing the communication. Within this process, various security weaknesses were discovered. Those allow various attacks, which will be shown in the last part of the paper.

2011
Chong Ryol Park Ki Hwan Eom

This paper describes a metal mount RFID tag that works reliably on metallic surfaces. The method proposes the use of commercial label type RFID tags with 2.5 mm thick Styrofoam103.7 with a relative permittivity of 1.03 attached on the back of the tag. In order to verify the performance of the proposed method, we performed experiments on an electric transformer supply chain system. The experimen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید