|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2540 occurrences of 986 keywords
|
|
|
Results
Found 10466 publication records. Showing 10466 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
136 | Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong |
Optimization of continuous query processing for RFID sensor tag data stream. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 586-591, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID sensor tag, continuous query, RFID system, data stream management system |
120 | Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom |
A Framework for Rapid Development of RFID Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 226-235, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
contextual event, RFID application development framework, RFID event, RFID |
119 | Fusheng Wang 0001, Shaorong Liu, Peiya Liu |
Complex RFID event processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 18(4), pp. 913-931, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID, Temporal, ECA rules, Complex event |
118 | Taesu Cheong, Youngil Kim |
RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, OTM Confederated International Conferences CoopIS, DOA, and ODBASE 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings, Part I, pp. 557-575, 2005, Springer, 3-540-29736-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
115 | Fusheng Wang 0001, Shaorong Liu, Peiya Liu, Yijian Bai |
Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT 2006, 10th International Conference on Extending Database Technology, Munich, Germany, March 26-31, 2006, Proceedings, pp. 588-607, 2006, Springer, 3-540-32960-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
103 | Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseok Choi |
Framework for Extending RFID Events with Business Rule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 955-961, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID event, RFID business event, RFID application development framework, RFID, business rule |
102 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback |
RFID security and privacy: long-term research or short-term tinkering? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 160, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
102 | Dong Seong Kim 0001, Taek-Hyun Shin, Jong Sou Park |
A Security Framework in RFID Multi-domain System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1227-1234, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
99 | Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li |
RFID privacy: relation between two notions, minimal condition, and efficient construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 54-65, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, rfid, pseudorandom function |
92 | Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 |
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 1171-1180, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID-tagged Banknotes, Self-updating, Privacy protection |
88 | Shahina Ferdous, Leonidas Fegaras, Fillia Makedon |
Applying data warehousing technique in pervasive assistive environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2010, Samos, Greece, June 23-25, 2010, 2010, ACM, 978-1-4503-0071-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
RFID cuboids and hyper cubes, RFID data warehouse, active and passive RFID, cleansed RFID data set, assistive environments |
86 | Yusuke Kawamura, Kazunori Shimamura |
The Network Management Scheme for Effective Consolidation of RFID-Tag Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 507-510, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID tag sensor network, RFID tag standard, RFID network integration standard, RNI Standard Operation Platform |
85 | O-Hoon Choi, Jung-Eun Lim, Hong-Seok Na, Doo-Kwon Baik |
Modeling for Missing Tissue Compensator Fabrication Using RFID Tag in U-Health. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISBMDA ![In: Biological and Medical Data Analysis, 7th International Symposium, ISBMDA 2006, Thessaloniki, Greece, December 7-8, 2006, Proceedings, pp. 463-471, 2006, Springer, 3-540-68063-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RFID, Compensator, Radiation Therapy |
83 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 184-194, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Xiao Jia 0003, Yuan Wenming, Wang Dong |
Complex event processing model for distributed RFID network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1219-1222, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID network, RFID, complex event processing |
82 | Mikyeong Moon, Keunhyuk Yeom |
Product Line Architecture for RFID-Enabled Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIS ![In: Business Information Systems, 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007, Proceedings, pp. 638-651, 2007, Springer, 978-3-540-72034-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID-enabled application, RFID, software product line, product line architecture |
82 | Namje Park, Seungjoo Kim, Dongho Won |
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWIC ![In: Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25 - 27, 2007, pp. 278-283, 2007, Springer, 978-3-540-72574-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Song Han 0004, Tharam S. Dillon, Elizabeth Chang 0001 |
Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007, Proceedings, pp. 623-632, 2007, Springer, 978-3-540-77023-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
80 | Young Man Kim |
Asynchronous Power-Saving Event-Delivery Protocols in Mobile USN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings, pp. 400-412, 2005, Springer, 3-540-30856-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom |
Contextual Events Framework in RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 586-587, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
contextual event, RFID event, high-level event, RFID, RFID middleware |
79 | Thomas Plos |
Susceptibility of UHF RFID Tags to Electromagnetic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 288-300, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA) |
79 | Son Le, Xu Huang 0001, Dharmendra Sharma 0001 |
A Multi-agent Architecture for RFID Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 917-925, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
classification, RFID, taxonomy, multi-agent, service-oriented, architecture framework |
76 | Kin Seong Leong, Mun Leng Ng, Alfio R. Grasso, Peter H. Cole |
Synchronization of RFID Readers for Dense RFID Reader Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2006 International Symposium on Applications and the Internet Workshops (SAINT 2006 Workshops), 23-27 January 2006, Phoenix, Arizona, USA, pp. 48-51, 2006, IEEE Computer Society, 0-7695-2510-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Kaushik Dutta, Krithi Ramamritham, B. Karthik, Kamlesh Laddhad |
Real-Time Event Handling in an RFID Middleware System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DNIS ![In: Databases in Networked Information Systems, 5th International Workshop, DNIS 2007, Aizu-Wakamatsu, Japan, October 17-19, 2007, Proceedings, pp. 232-251, 2007, Springer, 978-3-540-75511-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Min Kyu Han, Ilwoo Paik, Byung Hee Lee, Jinpyo Hong |
A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 98, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Hyangjin Lee, Jeeyeon Kim |
Privacy threats and issues in mobile RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 510-514, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Chae Hoon Lim, Taekyoung Kwon 0002 |
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 1-20, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
Is Your Cat Infected with a Computer Virus?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 13-17 March 2006, Pisa, Italy, pp. 169-179, 2006, IEEE Computer Society, 0-7695-2518-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Evan Welbourne, Nodira Khoussainova, Julie Letchner, Yang Li 0059, Magdalena Balazinska, Gaetano Borriello, Dan Suciu |
Cascadia: a system for specifying, detecting, and managing rfid events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008, pp. 281-294, 2008, ACM, 978-1-60558-139-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
event specification, pervasive computing, RFID, data management, event detection |
72 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
The Evolution of RFID Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 5(1), pp. 62-69, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, radio frequency identification, RFID, history |
68 | Travis Deyle, Charles C. Kemp, Matthew S. Reynolds |
Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, September 22-26, 2008, Acropolis Convention Center, Nice, France, pp. 1379-1384, 2008, IEEE, 978-1-4244-2057-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Namje Park, Youjin Song, Dongho Won |
Policy and role based mobile RFID user privacy data management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 1003-1006, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Aliasgar Kutiyanawala, Vladimir A. Kulyukin |
A Cartesian Robot for RFID Signal Distribution Model Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 244-257, 2008, Springer, 978-3-540-69292-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Christian Tellkamp, Thomas Wiechert, Frédéric Thiesse, Elgar Fleisch |
The Adoption of RFID-based Self-Check-Out-Systems at the Point-of-Sale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Project E-Society: Building Bricks, 6TH IFIP International Conference on e-Commerce, e-Business, and e-Government (I3E 2006), October 11-13, 2006, Turku, Finland, pp. 153-165, 2006, Springer, 978-0-387-39226-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Alex K. Jones, Raymond R. Hoare, Swapna R. Dontharaju, Shen Chih Tung, Ralph Sprang, Joshua Fazekas, James T. Cain, Marlin H. Mickle |
A Field Programmable RFID Tag and Associated Design Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 14th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2006), 24-26 April 2006, Napa, CA, USA, Proceedings, pp. 165-174, 2006, IEEE Computer Society, 0-7695-2661-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Divyan M. Konidala, Kwangjo Kim |
Mobile RFID Applications and Security Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 194-205, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Ki-Uk Kim, Hyun-Suk Hwang, Bong-Je Kim, Su-Hwan Jeong, Chang Soo Kim |
The Development of Reliability Verification Tool of RFID Tag for Effective Product Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 895-904, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Howon Kim 0001, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung |
Design and Implementation of Crypto Co-processor and Its Application to Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 1104-1109, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Crypto Algorithm, Power Consumption, Crypto Coprocessor |
65 | Ryoko Ueoka, Atsuji Masuda, Tetsuhiko Murakami, Hideyuki Miyayama, Hidenori Takeuchi, Kazuyuki Hashimoto, Michitaka Hirose |
Development of RFID Textile and Human Activity Detection Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (13) ![In: Virtual and Mixed Reality, Third International Conference, VMR 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 273-281, 2009, Springer, 978-3-642-02770-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID textile, Map making system, Human activity detection |
65 | Harinda Fernando, Jemal H. Abawajy |
A RFID architecture framework for global supply chain applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 313-320, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network, RFID, supply chain, architectural framework |
65 | Michael Buettner, Richa Prasad, Alanson P. Sample, Daniel J. Yeager, Ben Greenstein, Joshua R. Smith 0001, David Wetherall |
RFID sensor networks with the intel WISP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, SenSys 2008, Raleigh, NC, USA, November 5-7, 2008, pp. 393-394, 2008, ACM, 978-1-59593-990-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, rfid |
65 | Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf |
Public key based authentication for secure integration of sensor data and RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HeterSanet ![In: Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, HeterSanet 2008, Hong Kong, SAR, China, May 30, 2008, pp. 61-66, 2008, ACM, 978-1-60558-113-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, workflow, RFID, sensor, tag, certificate, public key |
65 | Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 733-740, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
guardian proxy, insubvertible encryption, RFID |
65 | Lenin Ravindranath, Venkata N. Padmanabhan, Piyush Agrawal |
Sixthsense: rfid-based enterprise intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008, pp. 253-266, 2008, ACM, 978-1-60558-139-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ubiquitous computing, sensing, rfid |
65 | Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare |
Vulnerabilities in First-Generation RFID-enabled Credit Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 2-14, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
contactless, RFID, vulnerabilities, credit cards |
65 | Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi |
Security and Privacy Analysis of RFID Systems Using Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006, Proceedings, pp. 495-504, 2006, Springer, 3-540-39368-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Model Checking, CSP, FDR, RFID Security, Casper |
65 | Batbold Toiruul, KyungOh Lee, HyunJun Lee, YoungHan Lee, Yoon Young Park |
Mutual-Authentication Mechanism for RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 449-460, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RFID, AES, cryptograph |
65 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
Privacy for RFID through trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 31-34, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID, trusted computing, audit |
65 | Ari Juels, Ronald L. Rivest, Michael Szydlo |
The blocker tag: selective blocking of RFID tags for consumer privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 103-111, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
tree walking, privacy, RFID tags, barcodes |
64 | Daniel Ronzani |
Why Marketing Short Range Devices as Active Radio Frequency Identifiers Might Backfire. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOT ![In: The Internet of Things, First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings, pp. 214-229, 2008, Springer, 978-3-540-78730-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
short range device (SRD), active tag, Radio frequency identification (RFID), industry, law, passive tag |
64 | Chir-Ho Chang, Jin-Ling Lin |
A Systematic Layout Planning of Visualizing Devices on a Non-rectangular Plane by Genetic Heuristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: New Trends in Applied Artificial Intelligence, 20th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2007, Kyoto, Japan, June 26-29, 2007, Proceedings, pp. 424-433, 2007, Springer, 978-3-540-73322-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Layout Planning, Genetic Algorithm, RFID, Heuristic Rules |
62 | Ted S. Phillips, Tom Karygiannis, Rick Kuhn |
Security Standards for the RFID Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(6), pp. 85-89, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security standards, RFID, radio frequency identification, RFID tags |
62 | Benjamin C. M. Fung, Ming Cao, Bipin C. Desai, Heng Xu |
Privacy protection for RFID data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 1528-1535, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data mining, anonymity, information sharing, privacy protection, sensitive information |
62 | Lars Kulseng, Zhen Yu, Yawen Wei, Yong Guan |
Lightweight Secure Search Protocols for Low-cost RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 22-26 June 2009, Montreal, Québec, Canada, pp. 40-48, 2009, IEEE Computer Society, 978-0-7695-3659-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
Secure and Serverless RFID Authentication and Search Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(4), pp. 1400-1407, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Tingting Mao, John R. Williams, Abel Sanchez |
Interoperable internet scale security framework for RFID networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 24th International Conference on Data Engineering Workshops, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 94-99, 2008, IEEE Computer Society, 978-1-4244-2161-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Zhibin Zhou 0001, Dijiang Huang |
SRK: A Distributed RFID Data Access Control Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 2854-2858, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Yijian Bai, Fusheng Wang 0001, Peiya Liu, Carlo Zaniolo, Shaorong Liu |
RFID Data Processing with a Data Stream Query Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007, pp. 1184-1193, 2007, IEEE Computer Society, 1-4244-0802-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
Severless Search and Authentication Protocols for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 19-23 March 2007, White Plains, New York, USA, pp. 3-12, 2007, IEEE Computer Society, 978-0-7695-2787-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Jie Wu 0006, Dong Wang, Huanye Sheng |
Design an OSGi Extension Service for Mobile RFID Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: Proceedings of ICEBE 2007, IEEE International Conference on e-Business Engineering and the Workshops SOAIC 2007, SOSE 2007, SOKM 2007, 24-26 October, 2007, Hong Kong, China, pp. 323-326, 2007, IEEE Computer Society, 0-7695-3003-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 51-59, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Xiaolan Joy Zhang, Brian King |
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 474-481, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Ari Juels |
RFID: security and privacy for five-cent wireless devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 31, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno |
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 479-490, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks |
60 | Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won |
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers, pp. 607-616, 2006, Springer, 978-3-540-77367-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
EPCglobal networkTM, password-derived key, authentication, RFID, password, encryption algorithm |
59 | Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed |
S-search: finding RFID tags using scalable and secure search protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 439-443, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
search protocol, security, scalability, RFID, ALOHA |
59 | Ching-Hsien Hsu, Shih-Chang Chen, Chia-Hao Yu, Jong Hyuk Park |
Alleviating reader collision problem in mobile RFID networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 13(7), pp. 489-497, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Reader collision problem, RFID scheduling, TPDM, Wireless network, Hidden terminal, Anti-collision |
59 | Zhong Ren, Chiu C. Tan 0001, Dong Wang, Qun Li 0001 |
Experimental Study on Mobile RFID Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, 4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009. Proceedings, pp. 12-21, 2009, Springer, 978-3-642-03416-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobility, RFID, experimental study |
59 | Evan Welbourne, Karl Koscher, Emad Soroush, Magdalena Balazinska, Gaetano Borriello |
Longitudinal study of a building-scale RFID ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Kraków, Poland, June 22-25, 2009, pp. 69-82, 2009, ACM, 978-1-60558-566-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
measurement, pervasive computing, rfid |
59 | Einar Sneve Martinussen, Timo Arnall |
Designing with RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TEI ![In: Proceedings of the 3rd International Conference on Tangible and Embedded Interaction 2009, Cambridge, UK, February 16-18, 2009, pp. 343-350, 2009, ACM, 978-1-60558-493-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
applied design, interaction design, RFID, tangible interaction, industrial design |
59 | Xingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan |
Efficient Complex Event Processing over RFID Data Stream. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 75-81, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RFID, Data Stream, Complex Event |
59 | Seyed Hossein Siadat, Ali Selamat |
Location-Based System for Mobile Devices Using RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 291-296, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile devices, RFID, J2ME, user query |
59 | Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm |
Tagmark: reliable estimations of RFID tags for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 999-1007, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RFID, estimation, data quality, data cleansing |
59 | Chun-Hee Lee, Chin-Wan Chung |
Efficient storage scheme and query processing for supply chain management using RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 291-302, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
path encoding scheme, region numbering scheme, supply chain management, rfid, prime number |
59 | JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha |
A New Formal Proof Model for RFID Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 267-281, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
formal proof model, location privacy, RFID security |
59 | Xinchao Zhao, Beihong Jin, Shuang Yu, Zhenyue Long |
Composite Subscription and Matching Algorithm for RFID Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 122-129, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
composite subscription, subscription matching algorithm, RFID applications |
59 | Christoph Angerer, Martin Holzer 0002, Bastian Knerr, Markus Rupp |
A flexible dual frequency testbed for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRIDENTCOM ![In: 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), March 18-20, 2008, Innsbruck, Austria, pp. 3, 2008, ICST, 978-963-9799-24-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dual frequency, RFID, rapid prototyping, testbed, reader |
59 | Xiaolan Joy Zhang, Brian King |
An Anti-Counterfeiting RFID Privacy Protection Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(3), pp. 438-448, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, integrity, RFID security |
59 | Nai-Wei Lo, Kuo-Hui Yeh |
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 43-56, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Data Security, Location Privacy, EPCglobal, CRC |
59 | Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo |
An Efficient Authentication Protocol for Low-Cost RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 999-1006, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, Authentication, RFID, location privacy, symmetric encryption |
59 | Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee |
A Design of Authentication Protocol for Multi-key RFID Tag. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 644-653, 2007, Springer, 978-3-540-72908-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-key, tag structure, RFID, authentication protocol |
59 | Günter Karjoth, Paul A. Moskowitz |
Disabling RFID tags with visible confirmation: clipped tags are silenced. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 27-30, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID |
59 | Sindhu Karthikeyan, Mikhail Nesterenko |
RFID security without extensive cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005, pp. 63-67, 2005, ACM, 1-59593-227-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, RFID |
59 | David Molnar, David A. Wagner 0001 |
Privacy and security in library RFID: issues, practices, and architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 210-219, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
private authentication, security, privacy, RFID |
59 | Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
Strong Authentication for RFID Systems Using the AES Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 357-370, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES) |
57 | Alex K. Jones, Swapna R. Dontharaju, Shen Chih Tung, Leonid Mats, Peter J. Hawrylak, Raymond R. Hoare, James T. Cain, Marlin H. Mickle |
Radio frequency identification prototyping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 13(2), pp. 29:1-29:22, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
low-power, RFID, prototyping, Design automation |
56 | Geethapriya Venkataramani, Srividya Gopalan |
Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 610-620, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Namje Park, Jooyoung Lee, Howon Kim 0001, Kyoil Chung, Sungwon Sohn |
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung |
SQL infections through RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(4), pp. 347-356, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RFID attacks, RFID virus, SQL infections, SQL injections |
56 | Iain A. Currie, Mahesh K. Marina |
Experimental evaluation of read performance for RFID-based mobile sensor data gathering applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUM ![In: Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia, MUM 2008, Umeå, Sweden, December 3-5, 2008, pp. 92-95, 2008, ACM, 978-1-60558-192-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RFID sensors, RFID-enabled mobile devices, mobile sensor data gathering, smart phones |
56 | Sarah Spiekermann |
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2007: Ubiquitous Computing, 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings, pp. 56-72, 2007, Springer, 978-3-540-74852-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID killfunction, security, privacy, authentication, RFID, identification, user behavior, privacy enhancing technology |
55 | Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Sun |
Leveraging spatio-temporal redundancy for RFID data cleansing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 51-62, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
uncertainty, data cleaning, probabilistic algorithms, spatio-temporal databases |
55 | Yingcai Wu, Ka-Kei Chung, Huamin Qu, Xiaoru Yuan, S. C. Cheung 0001 |
Interactive Visual Optimization and Analysis for RFID Benchmarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 15(6), pp. 1335-1342, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
Location Privacy in RFID Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 127-150, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Stefanie Jahner, Jan Marco Leimeister, Uta Franziska Knebel, Helmut Krcmar |
A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 405, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Han-Pang Huang, Ying-Ting Chang |
Robust Design for RFID System Testing and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2007 IEEE International Conference on Robotics and Automation, ICRA 2007, 10-14 April 2007, Roma, Italy, pp. 4594-4599, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Won-Ju Yoon, Sang-Hwa Chung, Seong-Joon Lee, Young-Sik Moon |
Design and Implementation of an Active RFID System for Fast Tag Collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 961-966, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Qinghan Xiao, Cam Boulet, Thomas E. Gibbons |
RFID Security Issues in Military Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 599-605, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Christian Floerkemeier, Matthias Lampe, Christof Roduner |
Facilitating RFID Development with the Accada Prototyping Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, USA, pp. 495-500, 2007, IEEE Computer Society, 978-0-7695-2788-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim |
An Analysis of RFID Tag Authentication Protocols Using Secret Value. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 482-487, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 10466 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|