نتایج جستجو برای: تراشه rfid

تعداد نتایج: 10121  

2005
Damith C. Ranasinghe Daniel W. Engels Peter H. Cole

In the implementation of Radio Frequency Identification (RFID) systems concerns have been raised regarding information security and violations of end-user privacy. There is a large collection of literature available on efficient and inexpensive cryptographic engines, but they are still extravagant solutions for low cost RFID systems. Security and privacy provided by low cost RFID is both direct...

2010
Aikaterini Mitrokotsa Michael Beye Pedro Peris-Lopez

RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform r...

Journal: :IJDST 2015
Kiyotaka Fujisaki

Using electromagnetic coupling, an RFID tag can get power supplier by a reader and communicate with it for data exchange. Because the RFID system enables non-contact communication, various services and applications including the management of a library catalogue are possible. However, the system is affected easily by neighboring environment and the resonant frequency, thus the communication per...

2004
Christian Floerkemeier Matthias Lampe

Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various sources of error in passive RFID systems, which can make the reliable operation of RFID augmented applications a challenge. To illustrate these sources of error, we equipped playing cards with RFID tags and measured the...

2016
Md. Endadul Hoque

PROTECTING PRIVACY AND ENSURING SECURITY OF RFID SYSTEMS USING PRIVATE AUTHENTICATION PROTOCOLS Md. Endadul Hoque Marquette University, 2010 Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification of objects and assets in various applications ranging from inventory tracking to point of sale applications and from healthcare applicati...

2004
Kenneth P. Fishkin Bing Jiang Matthai Philipose Sumit Roy

A novel method to infer interactions with passive RFID tagged objects is described. The method allows unobtrusive detection of human interactions with RFID tagged objects without requiring any modifications to existing communications protocols or RFID hardware. The object motion detection algorithm was integrated into a RFID monitoring system and tested in laboratory and home environments. The ...

Journal: :J. Network and Computer Applications 2014
Wei Xie Lei Xie Chen Zhang Qiang Wang Jian Xu Quan Zhang Chaojing Tang

This paper proposes a novel type of RFID application, i.e., RFID seeking. Several existing types of RFID applications such as monitoring, searching, locating/navigating, are similar with RFID seeking. However, they are either inapplicable or vulnerable for RFID seeking scenarios, in which a user is to find a lost tagged item in a blind spot, or to find a wanted item among a mass of similar ones...

2010
Namje Park

Mobile RFID environment means that mobile RFID devices like mobile (cellular) phone and PDA employing cellular network can be used at querying information of the consumer product related a tag. The mobile RFID devices should have mobile RFID readers which are made for them and are, in particular, compliant with EPC Class-1 Generation-2 UHF (860-960 MHz) standard. Ensuring the security of mobile...

Journal: :The Electronic Library 2007
Shien-Chiang Yu

Purpose – Radio frequency identification (RFID) applications that provide batch access, storage mass data and reprogramming are better than barcodes. Applying RFID can promote operational efficiency and precision. The cost is one of the major factors influencing whether or not RFID will be accepted in libraries. Although RFID has improved the efficiency of libraries, the essence of the library ...

2009
Haipeng Zhang Wooseok Ryu Md. Kafil Uddin Bonghee Hong

RFID technology enables a new era of business optimization. With the development of RFID technology, more and more RFID applications have been developed. In RFID system, RFID middleware collects, filters, and integrates large volume of streaming data gathered continuously by heterogeneous readers to process queries from applications. These queries are called continuous queries as they are execu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید