|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2540 occurrences of 986 keywords
|
|
|
Results
Found 10466 publication records. Showing 10466 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
136 | Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong |
Optimization of continuous query processing for RFID sensor tag data stream.  |
ICIS  |
2009 |
DBLP DOI BibTeX RDF |
RFID sensor tag, continuous query, RFID system, data stream management system |
120 | Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom |
A Framework for Rapid Development of RFID Applications.  |
ICCSA (4)  |
2006 |
DBLP DOI BibTeX RDF |
contextual event, RFID application development framework, RFID event, RFID |
119 | Fusheng Wang 0001, Shaorong Liu, Peiya Liu |
Complex RFID event processing.  |
VLDB J.  |
2009 |
DBLP DOI BibTeX RDF |
RFID, Temporal, ECA rules, Complex event |
118 | Taesu Cheong, Youngil Kim |
RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation.  |
OTM Conferences (1)  |
2005 |
DBLP DOI BibTeX RDF |
|
115 | Fusheng Wang 0001, Shaorong Liu, Peiya Liu, Yijian Bai |
Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams.  |
EDBT  |
2006 |
DBLP DOI BibTeX RDF |
|
103 | Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseok Choi |
Framework for Extending RFID Events with Business Rule.  |
DASFAA  |
2007 |
DBLP DOI BibTeX RDF |
RFID event, RFID business event, RFID application development framework, RFID, business rule |
102 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback |
RFID security and privacy: long-term research or short-term tinkering?  |
WISEC  |
2008 |
DBLP DOI BibTeX RDF |
|
102 | Dong Seong Kim 0001, Taek-Hyun Shin, Jong Sou Park |
A Security Framework in RFID Multi-domain System.  |
ARES  |
2007 |
DBLP DOI BibTeX RDF |
|
99 | Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li |
RFID privacy: relation between two notions, minimal condition, and efficient construction.  |
CCS  |
2009 |
DBLP DOI BibTeX RDF |
privacy, rfid, pseudorandom function |
92 | Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 |
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes.  |
UIC  |
2007 |
DBLP DOI BibTeX RDF |
RFID-tagged Banknotes, Self-updating, Privacy protection |
88 | Shahina Ferdous, Leonidas Fegaras, Fillia Makedon |
Applying data warehousing technique in pervasive assistive environment.  |
PETRA  |
2010 |
DBLP DOI BibTeX RDF |
RFID cuboids and hyper cubes, RFID data warehouse, active and passive RFID, cleansed RFID data set, assistive environments |
86 | Yusuke Kawamura, Kazunori Shimamura |
The Network Management Scheme for Effective Consolidation of RFID-Tag Standards.  |
APNOMS  |
2009 |
DBLP DOI BibTeX RDF |
RFID tag sensor network, RFID tag standard, RFID network integration standard, RNI Standard Operation Platform |
85 | O-Hoon Choi, Jung-Eun Lim, Hong-Seok Na, Doo-Kwon Baik |
Modeling for Missing Tissue Compensator Fabrication Using RFID Tag in U-Health.  |
ISBMDA  |
2006 |
DBLP DOI BibTeX RDF |
RFID, Compensator, Radiation Therapy |
83 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.  |
ACISP  |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Xiao Jia 0003, Yuan Wenming, Wang Dong |
Complex event processing model for distributed RFID network.  |
ICIS  |
2009 |
DBLP DOI BibTeX RDF |
RFID network, RFID, complex event processing |
82 | Mikyeong Moon, Keunhyuk Yeom |
Product Line Architecture for RFID-Enabled Applications.  |
BIS  |
2007 |
DBLP DOI BibTeX RDF |
RFID-enabled application, RFID, software product line, product line architecture |
82 | Namje Park, Seungjoo Kim, Dongho Won |
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network.  |
AWIC  |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Song Han 0004, Tharam S. Dillon, Elizabeth Chang 0001 |
Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database.  |
MSN  |
2007 |
DBLP DOI BibTeX RDF |
|
80 | Young Man Kim |
Asynchronous Power-Saving Event-Delivery Protocols in Mobile USN.  |
MSN  |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom |
Contextual Events Framework in RFID System.  |
ITNG  |
2006 |
DBLP DOI BibTeX RDF |
contextual event, RFID event, high-level event, RFID, RFID middleware |
79 | Thomas Plos |
Susceptibility of UHF RFID Tags to Electromagnetic Analysis.  |
CT-RSA  |
2008 |
DBLP DOI BibTeX RDF |
EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA) |
79 | Son Le, Xu Huang 0001, Dharmendra Sharma 0001 |
A Multi-agent Architecture for RFID Taxonomy.  |
KES (3)  |
2007 |
DBLP DOI BibTeX RDF |
classification, RFID, taxonomy, multi-agent, service-oriented, architecture framework |
76 | Kin Seong Leong, Mun Leng Ng, Alfio R. Grasso, Peter H. Cole |
Synchronization of RFID Readers for Dense RFID Reader Environments.  |
SAINT Workshops  |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Kaushik Dutta, Krithi Ramamritham, B. Karthik, Kamlesh Laddhad |
Real-Time Event Handling in an RFID Middleware System.  |
DNIS  |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Min Kyu Han, Ilwoo Paik, Byung Hee Lee, Jinpyo Hong |
A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network.  |
CIT  |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Hyangjin Lee, Jeeyeon Kim |
Privacy threats and issues in mobile RFID.  |
ARES  |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Chae Hoon Lim, Taekyoung Kwon 0002 |
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer.  |
ICICS  |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
Is Your Cat Infected with a Computer Virus?.  |
PerCom  |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Evan Welbourne, Nodira Khoussainova, Julie Letchner, Yang Li 0059, Magdalena Balazinska, Gaetano Borriello, Dan Suciu |
Cascadia: a system for specifying, detecting, and managing rfid events.  |
MobiSys  |
2008 |
DBLP DOI BibTeX RDF |
event specification, pervasive computing, RFID, data management, event detection |
72 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
The Evolution of RFID Security.  |
IEEE Pervasive Comput.  |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, radio frequency identification, RFID, history |
68 | Travis Deyle, Charles C. Kemp, Matthew S. Reynolds |
Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model.  |
IROS  |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Namje Park, Youjin Song, Dongho Won |
Policy and role based mobile RFID user privacy data management system.  |
NOMS  |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Aliasgar Kutiyanawala, Vladimir A. Kulyukin |
A Cartesian Robot for RFID Signal Distribution Model Verification.  |
UIC  |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Christian Tellkamp, Thomas Wiechert, Frédéric Thiesse, Elgar Fleisch |
The Adoption of RFID-based Self-Check-Out-Systems at the Point-of-Sale.  |
I3E  |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Alex K. Jones, Raymond R. Hoare, Swapna R. Dontharaju, Shen Chih Tung, Ralph Sprang, Joshua Fazekas, James T. Cain, Marlin H. Mickle |
A Field Programmable RFID Tag and Associated Design Flow.  |
FCCM  |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Divyan M. Konidala, Kwangjo Kim |
Mobile RFID Applications and Security Challenges.  |
ICISC  |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Ki-Uk Kim, Hyun-Suk Hwang, Bong-Je Kim, Su-Hwan Jeong, Chang Soo Kim |
The Development of Reliability Verification Tool of RFID Tag for Effective Product Control Systems.  |
ICCSA (5)  |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Howon Kim 0001, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung |
Design and Implementation of Crypto Co-processor and Its Application to Security Systems.  |
CIS (2)  |
2005 |
DBLP DOI BibTeX RDF |
Crypto Algorithm, Power Consumption, Crypto Coprocessor |
65 | Ryoko Ueoka, Atsuji Masuda, Tetsuhiko Murakami, Hideyuki Miyayama, Hidenori Takeuchi, Kazuyuki Hashimoto, Michitaka Hirose |
Development of RFID Textile and Human Activity Detection Applications.  |
HCI (13)  |
2009 |
DBLP DOI BibTeX RDF |
RFID textile, Map making system, Human activity detection |
65 | Harinda Fernando, Jemal H. Abawajy |
A RFID architecture framework for global supply chain applications.  |
iiWAS  |
2009 |
DBLP DOI BibTeX RDF |
network, RFID, supply chain, architectural framework |
65 | Michael Buettner, Richa Prasad, Alanson P. Sample, Daniel J. Yeager, Ben Greenstein, Joshua R. Smith 0001, David Wetherall |
RFID sensor networks with the intel WISP.  |
SenSys  |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, rfid |
65 | Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf |
Public key based authentication for secure integration of sensor data and RFID.  |
HeterSanet  |
2008 |
DBLP DOI BibTeX RDF |
authentication, workflow, RFID, sensor, tag, certificate, public key |
65 | Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy.  |
ARES  |
2008 |
DBLP DOI BibTeX RDF |
guardian proxy, insubvertible encryption, RFID |
65 | Lenin Ravindranath, Venkata N. Padmanabhan, Piyush Agrawal |
Sixthsense: rfid-based enterprise intelligence.  |
MobiSys  |
2008 |
DBLP DOI BibTeX RDF |
ubiquitous computing, sensing, rfid |
65 | Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare |
Vulnerabilities in First-Generation RFID-enabled Credit Cards.  |
Financial Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
contactless, RFID, vulnerabilities, credit cards |
65 | Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi |
Security and Privacy Analysis of RFID Systems Using Model Checking.  |
HPCC  |
2006 |
DBLP DOI BibTeX RDF |
Model Checking, CSP, FDR, RFID Security, Casper |
65 | Batbold Toiruul, KyungOh Lee, HyunJun Lee, YoungHan Lee, Yoon Young Park |
Mutual-Authentication Mechanism for RFID Systems.  |
MSN  |
2006 |
DBLP DOI BibTeX RDF |
RFID, AES, cryptograph |
65 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
Privacy for RFID through trusted computing.  |
WPES  |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID, trusted computing, audit |
65 | Ari Juels, Ronald L. Rivest, Michael Szydlo |
The blocker tag: selective blocking of RFID tags for consumer privacy.  |
CCS  |
2003 |
DBLP DOI BibTeX RDF |
tree walking, privacy, RFID tags, barcodes |
64 | Daniel Ronzani |
Why Marketing Short Range Devices as Active Radio Frequency Identifiers Might Backfire.  |
IOT  |
2008 |
DBLP DOI BibTeX RDF |
short range device (SRD), active tag, Radio frequency identification (RFID), industry, law, passive tag |
64 | Chir-Ho Chang, Jin-Ling Lin |
A Systematic Layout Planning of Visualizing Devices on a Non-rectangular Plane by Genetic Heuristics.  |
IEA/AIE  |
2007 |
DBLP DOI BibTeX RDF |
Layout Planning, Genetic Algorithm, RFID, Heuristic Rules |
62 | Ted S. Phillips, Tom Karygiannis, Rick Kuhn |
Security Standards for the RFID Market.  |
IEEE Secur. Priv.  |
2005 |
DBLP DOI BibTeX RDF |
security standards, RFID, radio frequency identification, RFID tags |
62 | Benjamin C. M. Fung, Ming Cao, Bipin C. Desai, Heng Xu |
Privacy protection for RFID data.  |
SAC  |
2009 |
DBLP DOI BibTeX RDF |
data mining, anonymity, information sharing, privacy protection, sensitive information |
62 | Lars Kulseng, Zhen Yu, Yawen Wei, Yong Guan |
Lightweight Secure Search Protocols for Low-cost RFID Systems.  |
ICDCS  |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
Secure and Serverless RFID Authentication and Search Protocols.  |
IEEE Trans. Wirel. Commun.  |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Tingting Mao, John R. Williams, Abel Sanchez |
Interoperable internet scale security framework for RFID networks.  |
ICDE Workshops  |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Zhibin Zhou 0001, Dijiang Huang |
SRK: A Distributed RFID Data Access Control Mechanism.  |
ICC  |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Yijian Bai, Fusheng Wang 0001, Peiya Liu, Carlo Zaniolo, Shaorong Liu |
RFID Data Processing with a Data Stream Query Language.  |
ICDE  |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
Severless Search and Authentication Protocols for RFID.  |
PerCom  |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Jie Wu 0006, Dong Wang, Huanye Sheng |
Design an OSGi Extension Service for Mobile RFID Applications.  |
ICEBE  |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.  |
Security Protocols Workshop  |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Xiaolan Joy Zhang, Brian King |
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.  |
ISC  |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Ari Juels |
RFID: security and privacy for five-cent wireless devices.  |
Workshop on Wireless Security  |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno |
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.  |
CCS  |
2008 |
DBLP DOI BibTeX RDF |
context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks |
60 | Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won |
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.  |
ICHIT  |
2006 |
DBLP DOI BibTeX RDF |
EPCglobal networkTM, password-derived key, authentication, RFID, password, encryption algorithm |
59 | Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed |
S-search: finding RFID tags using scalable and secure search protocol.  |
SAC  |
2010 |
DBLP DOI BibTeX RDF |
search protocol, security, scalability, RFID, ALOHA |
59 | Ching-Hsien Hsu, Shih-Chang Chen, Chia-Hao Yu, Jong Hyuk Park |
Alleviating reader collision problem in mobile RFID networks.  |
Pers. Ubiquitous Comput.  |
2009 |
DBLP DOI BibTeX RDF |
Reader collision problem, RFID scheduling, TPDM, Wireless network, Hidden terminal, Anti-collision |
59 | Zhong Ren, Chiu C. Tan 0001, Dong Wang, Qun Li 0001 |
Experimental Study on Mobile RFID Performance.  |
WASA  |
2009 |
DBLP DOI BibTeX RDF |
mobility, RFID, experimental study |
59 | Evan Welbourne, Karl Koscher, Emad Soroush, Magdalena Balazinska, Gaetano Borriello |
Longitudinal study of a building-scale RFID ecosystem.  |
MobiSys  |
2009 |
DBLP DOI BibTeX RDF |
measurement, pervasive computing, rfid |
59 | Einar Sneve Martinussen, Timo Arnall |
Designing with RFID.  |
TEI  |
2009 |
DBLP DOI BibTeX RDF |
applied design, interaction design, RFID, tangible interaction, industrial design |
59 | Xingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan |
Efficient Complex Event Processing over RFID Data Stream.  |
ACIS-ICIS  |
2008 |
DBLP DOI BibTeX RDF |
RFID, Data Stream, Complex Event |
59 | Seyed Hossein Siadat, Ali Selamat |
Location-Based System for Mobile Devices Using RFID.  |
Asia International Conference on Modelling and Simulation  |
2008 |
DBLP DOI BibTeX RDF |
mobile devices, RFID, J2ME, user query |
59 | Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm |
Tagmark: reliable estimations of RFID tags for business processes.  |
KDD  |
2008 |
DBLP DOI BibTeX RDF |
RFID, estimation, data quality, data cleansing |
59 | Chun-Hee Lee, Chin-Wan Chung |
Efficient storage scheme and query processing for supply chain management using RFID.  |
SIGMOD Conference  |
2008 |
DBLP DOI BibTeX RDF |
path encoding scheme, region numbering scheme, supply chain management, rfid, prime number |
59 | JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha |
A New Formal Proof Model for RFID Location Privacy.  |
ESORICS  |
2008 |
DBLP DOI BibTeX RDF |
formal proof model, location privacy, RFID security |
59 | Xinchao Zhao, Beihong Jin, Shuang Yu, Zhenyue Long |
Composite Subscription and Matching Algorithm for RFID Applications.  |
AINA  |
2008 |
DBLP DOI BibTeX RDF |
composite subscription, subscription matching algorithm, RFID applications |
59 | Christoph Angerer, Martin Holzer 0002, Bastian Knerr, Markus Rupp |
A flexible dual frequency testbed for RFID.  |
TRIDENTCOM  |
2008 |
DBLP DOI BibTeX RDF |
dual frequency, RFID, rapid prototyping, testbed, reader |
59 | Xiaolan Joy Zhang, Brian King |
An Anti-Counterfeiting RFID Privacy Protection Protocol.  |
J. Comput. Sci. Technol.  |
2007 |
DBLP DOI BibTeX RDF |
privacy, integrity, RFID security |
59 | Nai-Wei Lo, Kuo-Hui Yeh |
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System.  |
EUC Workshops  |
2007 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Data Security, Location Privacy, EPCglobal, CRC |
59 | Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo |
An Efficient Authentication Protocol for Low-Cost RFID Systems.  |
KES-AMSTA  |
2007 |
DBLP DOI BibTeX RDF |
security, Authentication, RFID, location privacy, symmetric encryption |
59 | Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee |
A Design of Authentication Protocol for Multi-key RFID Tag.  |
APWeb/WAIM Workshops  |
2007 |
DBLP DOI BibTeX RDF |
multi-key, tag structure, RFID, authentication protocol |
59 | Günter Karjoth, Paul A. Moskowitz |
Disabling RFID tags with visible confirmation: clipped tags are silenced.  |
WPES  |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID |
59 | Sindhu Karthikeyan, Mikhail Nesterenko |
RFID security without extensive cryptography.  |
SASN  |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, RFID |
59 | David Molnar, David A. Wagner 0001 |
Privacy and security in library RFID: issues, practices, and architectures.  |
CCS  |
2004 |
DBLP DOI BibTeX RDF |
private authentication, security, privacy, RFID |
59 | Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
Strong Authentication for RFID Systems Using the AES Algorithm.  |
CHES  |
2004 |
DBLP DOI BibTeX RDF |
symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES) |
57 | Alex K. Jones, Swapna R. Dontharaju, Shen Chih Tung, Leonid Mats, Peter J. Hawrylak, Raymond R. Hoare, James T. Cain, Marlin H. Mickle |
Radio frequency identification prototyping.  |
ACM Trans. Design Autom. Electr. Syst.  |
2008 |
DBLP DOI BibTeX RDF |
low-power, RFID, prototyping, Design automation |
56 | Geethapriya Venkataramani, Srividya Gopalan |
Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards.  |
ARES  |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Namje Park, Jooyoung Lee, Howon Kim 0001, Kyoil Chung, Sungwon Sohn |
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System).  |
NOMS  |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung |
SQL infections through RFID.  |
J. Comput. Virol.  |
2008 |
DBLP DOI BibTeX RDF |
RFID attacks, RFID virus, SQL infections, SQL injections |
56 | Iain A. Currie, Mahesh K. Marina |
Experimental evaluation of read performance for RFID-based mobile sensor data gathering applications.  |
MUM  |
2008 |
DBLP DOI BibTeX RDF |
RFID sensors, RFID-enabled mobile devices, mobile sensor data gathering, smart phones |
56 | Sarah Spiekermann |
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation.  |
UbiComp  |
2007 |
DBLP DOI BibTeX RDF |
RFID killfunction, security, privacy, authentication, RFID, identification, user behavior, privacy enhancing technology |
55 | Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Sun |
Leveraging spatio-temporal redundancy for RFID data cleansing.  |
SIGMOD Conference  |
2010 |
DBLP DOI BibTeX RDF |
uncertainty, data cleaning, probabilistic algorithms, spatio-temporal databases |
55 | Yingcai Wu, Ka-Kei Chung, Huamin Qu, Xiaoru Yuan, S. C. Cheung 0001 |
Interactive Visual Optimization and Analysis for RFID Benchmarking.  |
IEEE Trans. Vis. Comput. Graph.  |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
Location Privacy in RFID Applications.  |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 127-150, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Stefanie Jahner, Jan Marco Leimeister, Uta Franziska Knebel, Helmut Krcmar |
A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy.  |
HICSS  |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Han-Pang Huang, Ying-Ting Chang |
Robust Design for RFID System Testing and Applications.  |
ICRA  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Won-Ju Yoon, Sang-Hwa Chung, Seong-Joon Lee, Young-Sik Moon |
Design and Implementation of an Active RFID System for Fast Tag Collection.  |
CIT  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Qinghan Xiao, Cam Boulet, Thomas E. Gibbons |
RFID Security Issues in Military Supply Chains.  |
ARES  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Christian Floerkemeier, Matthias Lampe, Christof Roduner |
Facilitating RFID Development with the Accada Prototyping Platform.  |
PerCom Workshops  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim |
An Analysis of RFID Tag Authentication Protocols Using Secret Value.  |
FGCN (1)  |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 10466 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|