نتایج جستجو برای: rfid tags

تعداد نتایج: 24998  

2005
Melanie R. Rieback Bruno Crispo Andrew S. Tanenbaum

This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jammin...

Journal: :MONET 2014
Yafeng Yin Lei Xie Sanglu Lu Daoxu Chen

With the rapid proliferation of RFID technologies, RFID has been introduced to the applications like safety inspection and warehouse management. Conventionally a number of deployment rules are specified for these applications. This paper studies a practically important problem of rule checking over RFID tags, i.e., checking whether the specified rules are satisfied according to the RFID tags wi...

2005
Shingo Kinoshita Miyako Ohkubo Fumitaka Hoshino Gembu Morohashi Osamu Shionoiri Atsushi Kanai

In the coming future ubiquitous society, Radio Frequency Identification (RFID) tags will be affixed to every product and person. This technology is anticipated to be a key technology that will be utilized by various ubiquitous services where these tags will be used to identify things and people and will automatically take advantage of contextual information such as location. On the other hand, ...

2012
Matthew Chan Xiaowen Zhang

We propose three indoor localization algorithms, namely the leveled nearest-neighbor, leveled multilateration and leveled Bayesian inference, to locate stationary objects (books, merchandise) by affixing passive RFID tags to them. The algorithms use a number of passive tags deployed on the known coordinates as reference points. The simulation results show that the proposed leveled detectable co...

2015
Esteban Masobro Garcia Konstantinos Markantonakis

RFID is an automatic identification (Auto-ID) technology. Tiny data-carrying devices known as RFID tags are attached to objects. Readers can interrogate those tags wirelessly so that the associated objects can be identified. For instance, those objects could be supermarket articles to be scanned at the checkout. Other Auto-ID technologies include barcode systems, optical character recognition, ...

2015
Esteban Masobro Garcia Konstantinos Markantonakis

RFID is an automatic identification (Auto-ID) technology. Tiny data-carrying devices known as RFID tags are attached to objects. Readers can interrogate those tags wirelessly so that the associated objects can be identified. For instance, those objects could be supermarket articles to be scanned at the checkout. Other Auto-ID technologies include barcode systems, optical character recognition, ...

Journal: :Issues of radio electronics 2020

Journal: :JoWUA 2011
Atsuko Miyaji Mohammad Shahriar Rahman Masakazu Soshi

Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Supply-chain, inventory management are the areas where low-cost and secure batchmode authentication of RFID tags is required. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also...

2011
Qihe Pan Ram M. Narayanan

Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target di...

Journal: :J. Network and Computer Applications 2011
Wei-Shinn Ku Kazuya Sakai Min-Te Sun

Radio Frequency Identification (RFID) technologies are applied in many fields for a variety of applications today. Recently, new solutions are proposed to deploy RF tags on the ground instead of attaching them to objects for RFID-based monitoring and localization. However, the optimal tag deployment strategy is yet to be addressed. In this paper, we identify the optimal deployment patterns that...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید