نتایج جستجو برای: فناوری rfid
تعداد نتایج: 25932 فیلتر نتایج به سال:
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems — including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID virus. The various RFID malware approaches are then analyzed for their effectiveness across a range ...
Deployment of radio frequency identification (RFID) systems is rapidly growing and has the potential to affect many different industries and applications. We present a brief history of RFID technology and automatic identification systems. We summarize major RFID applications, and present a primer on RFID fundamental principles. Finally, we discuss several challenges and obstacles to RFID adopti...
RFID-technologies have been described as major enabling technologies for automated, contactless data collection. We conveyed a quantitative survey of 463 executives across various industries in Germany to investigate about the perceived strategic importance of RFID among IT decision makers, current RFID usage, companies' intentions to invest in RFID and visions of RFID application. The survey r...
Supply chain management has two streams of strategies, namely lean and agile. However, current RFID applications tend to overlook supply chain strategies and are designed for obvious RFID applications, like simply replacing barcodes. However, the full potential of RFID might not be achieved when RFID applications are not aligned with the supply chain strategies. Therefore, this study analyzes t...
Recently, mobile RFID (Radio Frequency Identification) services such as in smart poster or supply chain are rapidly growing up as a newly generating industry. Here, mobile RFID service is defined as a special type of mobile service using RFID tag packaging object and RFID reader attached mobile RFID terminal. This paper is to provide an approach for ensuring RFID net-work security based on secu...
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platfor...
چکیده ندارد.
As the load of traffic increases in RFID middleware, RFID system can no longer manage the RFID tags. Because of the incapability of the RFID system to handle vast amount of RFID tags, there are possibilities that the data cannot be processed efficiently in the RFID middleware. Implementation of agent technology is useful for verification and validation in RFID system architecture because intell...
Radio Frequency identification (RFID) is the popular wireless induction system [1-7]. The same as the general bar code identification, each RFID tag in an RFID system is assumed that equips a unique ID (UID) itself. A standard RFID system is consisted of Tag, Reader, and Application. When an independent RFID tag approaches the RFID antenna, the induc‐ tion between RFID tag and antenna happens. ...
Mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید