نتایج جستجو برای: rfid applications
تعداد نتایج: 616818 فیلتر نتایج به سال:
Radio Frequency Identification (RFID) systems can be found in wide spread applications – from simple theft prevention over multi bit transponders up to complex applications involving contactless smartcards. This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled. It is examined how much energy a passiv...
RFID middleware is a cornerstone of non-trivial RFID deployments in complex heterogeneous environments. In this paper we present the principal middleware building blocks specified in the scope of the EPCglobal architecture. Alternative protocols and implementation frameworks for realizing these middleware blocks are also presented. At the same time we outline several middleware extensions to th...
European Journal of Information Systems (2009) 18, 534–540. doi:10.1057/ejis.2009.43 Radio frequency identification (RFID) allows automated identification of products by embedding chips with wireless antennas on objects. RFID uses transponder technology for the contactless recognition of objects. An important element of this technology is the RFID tag comprising a small computer chip and a wire...
Vehicle tracking plays more important roles in modern transportation and logistics operation. This paper deals with a new approach to track vehicles based on RFID (Radio Frequency Identification) technology. The vehicle tracking system is designed overallly supported by Axiomatic Design theory. The basic steps of vehicle tracking based on RFID are developed and a six-layered architecture for th...
701 Abstract— RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by res...
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new challenges to existing underlying database technologies, such as the requirements of supporting big volume data, preserving data transition path and handling new types of queries. In this paper, we propose an efficient...
The WP4 “Security” work package of BRIDGE is examining ways to ensure that RFID tags, readers, network infrastructure, and RFID services are developed in harmony with security features to enable effective and safe deployment of applications in various business sectors. However, some organizations tend to see security as nothing more than an extra feature or a “nice to have” for RFID deployments...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید