The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RfID with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2002 (19) 2003 (20) 2004 (101) 2005 (236) 2006 (420) 2007 (701) 2008 (684) 2009 (816) 2010 (668) 2011 (786) 2012 (694) 2013 (653) 2014 (612) 2015 (546) 2016 (509) 2017 (510) 2018 (498) 2019 (533) 2020 (365) 2021 (421) 2022 (370) 2023 (248) 2024 (56)
Publication types (Num. hits)
article(4009) book(15) data(9) incollection(57) inproceedings(6270) phdthesis(78) proceedings(28)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2540 occurrences of 986 keywords

Results
Found 10466 publication records. Showing 10466 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
136Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong Optimization of continuous query processing for RFID sensor tag data stream. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID sensor tag, continuous query, RFID system, data stream management system
120Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom A Framework for Rapid Development of RFID Applications. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF contextual event, RFID application development framework, RFID event, RFID
119Fusheng Wang 0001, Shaorong Liu, Peiya Liu Complex RFID event processing. Search on Bibsonomy VLDB J. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, Temporal, ECA rules, Complex event
118Taesu Cheong, Youngil Kim RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
115Fusheng Wang 0001, Shaorong Liu, Peiya Liu, Yijian Bai Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams. Search on Bibsonomy EDBT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
103Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseok Choi Framework for Extending RFID Events with Business Rule. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID event, RFID business event, RFID application development framework, RFID, business rule
102Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback RFID security and privacy: long-term research or short-term tinkering? Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
102Dong Seong Kim 0001, Taek-Hyun Shin, Jong Sou Park A Security Framework in RFID Multi-domain System. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
99Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li RFID privacy: relation between two notions, minimal condition, and efficient construction. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, rfid, pseudorandom function
92Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID-tagged Banknotes, Self-updating, Privacy protection
88Shahina Ferdous, Leonidas Fegaras, Fillia Makedon Applying data warehousing technique in pervasive assistive environment. Search on Bibsonomy PETRA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RFID cuboids and hyper cubes, RFID data warehouse, active and passive RFID, cleansed RFID data set, assistive environments
86Yusuke Kawamura, Kazunori Shimamura The Network Management Scheme for Effective Consolidation of RFID-Tag Standards. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID tag sensor network, RFID tag standard, RFID network integration standard, RNI Standard Operation Platform
85O-Hoon Choi, Jung-Eun Lim, Hong-Seok Na, Doo-Kwon Baik Modeling for Missing Tissue Compensator Fabrication Using RFID Tag in U-Health. Search on Bibsonomy ISBMDA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RFID, Compensator, Radiation Therapy
83Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
82Xiao Jia 0003, Yuan Wenming, Wang Dong Complex event processing model for distributed RFID network. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID network, RFID, complex event processing
82Mikyeong Moon, Keunhyuk Yeom Product Line Architecture for RFID-Enabled Applications. Search on Bibsonomy BIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID-enabled application, RFID, software product line, product line architecture
82Namje Park, Seungjoo Kim, Dongho Won Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. Search on Bibsonomy AWIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
82Song Han 0004, Tharam S. Dillon, Elizabeth Chang 0001 Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
80Young Man Kim Asynchronous Power-Saving Event-Delivery Protocols in Mobile USN. Search on Bibsonomy MSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
79Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom Contextual Events Framework in RFID System. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF contextual event, RFID event, high-level event, RFID, RFID middleware
79Thomas Plos Susceptibility of UHF RFID Tags to Electromagnetic Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA)
79Son Le, Xu Huang 0001, Dharmendra Sharma 0001 A Multi-agent Architecture for RFID Taxonomy. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF classification, RFID, taxonomy, multi-agent, service-oriented, architecture framework
76Kin Seong Leong, Mun Leng Ng, Alfio R. Grasso, Peter H. Cole Synchronization of RFID Readers for Dense RFID Reader Environments. Search on Bibsonomy SAINT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Kaushik Dutta, Krithi Ramamritham, B. Karthik, Kamlesh Laddhad Real-Time Event Handling in an RFID Middleware System. Search on Bibsonomy DNIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
75Min Kyu Han, Ilwoo Paik, Byung Hee Lee, Jinpyo Hong A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Hyangjin Lee, Jeeyeon Kim Privacy threats and issues in mobile RFID. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Chae Hoon Lim, Taekyoung Kwon 0002 Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum Is Your Cat Infected with a Computer Virus?. Search on Bibsonomy PerCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
72Evan Welbourne, Nodira Khoussainova, Julie Letchner, Yang Li 0059, Magdalena Balazinska, Gaetano Borriello, Dan Suciu Cascadia: a system for specifying, detecting, and managing rfid events. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF event specification, pervasive computing, RFID, data management, event detection
72Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum The Evolution of RFID Security. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, privacy, radio frequency identification, RFID, history
68Travis Deyle, Charles C. Kemp, Matthew S. Reynolds Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Namje Park, Youjin Song, Dongho Won Policy and role based mobile RFID user privacy data management system. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Aliasgar Kutiyanawala, Vladimir A. Kulyukin A Cartesian Robot for RFID Signal Distribution Model Verification. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Christian Tellkamp, Thomas Wiechert, Frédéric Thiesse, Elgar Fleisch The Adoption of RFID-based Self-Check-Out-Systems at the Point-of-Sale. Search on Bibsonomy I3E The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
68Alex K. Jones, Raymond R. Hoare, Swapna R. Dontharaju, Shen Chih Tung, Ralph Sprang, Joshua Fazekas, James T. Cain, Marlin H. Mickle A Field Programmable RFID Tag and Associated Design Flow. Search on Bibsonomy FCCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
68Divyan M. Konidala, Kwangjo Kim Mobile RFID Applications and Security Challenges. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
68Ki-Uk Kim, Hyun-Suk Hwang, Bong-Je Kim, Su-Hwan Jeong, Chang Soo Kim The Development of Reliability Verification Tool of RFID Tag for Effective Product Control Systems. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67Howon Kim 0001, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung Design and Implementation of Crypto Co-processor and Its Application to Security Systems. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Crypto Algorithm, Power Consumption, Crypto Coprocessor
65Ryoko Ueoka, Atsuji Masuda, Tetsuhiko Murakami, Hideyuki Miyayama, Hidenori Takeuchi, Kazuyuki Hashimoto, Michitaka Hirose Development of RFID Textile and Human Activity Detection Applications. Search on Bibsonomy HCI (13) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID textile, Map making system, Human activity detection
65Harinda Fernando, Jemal H. Abawajy A RFID architecture framework for global supply chain applications. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network, RFID, supply chain, architectural framework
65Michael Buettner, Richa Prasad, Alanson P. Sample, Daniel J. Yeager, Ben Greenstein, Joshua R. Smith 0001, David Wetherall RFID sensor networks with the intel WISP. Search on Bibsonomy SenSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, rfid
65Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf Public key based authentication for secure integration of sensor data and RFID. Search on Bibsonomy HeterSanet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, workflow, RFID, sensor, tag, certificate, public key
65Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF guardian proxy, insubvertible encryption, RFID
65Lenin Ravindranath, Venkata N. Padmanabhan, Piyush Agrawal Sixthsense: rfid-based enterprise intelligence. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ubiquitous computing, sensing, rfid
65Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare Vulnerabilities in First-Generation RFID-enabled Credit Cards. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF contactless, RFID, vulnerabilities, credit cards
65Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi Security and Privacy Analysis of RFID Systems Using Model Checking. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Model Checking, CSP, FDR, RFID Security, Casper
65Batbold Toiruul, KyungOh Lee, HyunJun Lee, YoungHan Lee, Yoon Young Park Mutual-Authentication Mechanism for RFID Systems. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RFID, AES, cryptograph
65David Molnar, Andrea Soppera, David A. Wagner 0001 Privacy for RFID through trusted computing. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID, trusted computing, audit
65Ari Juels, Ronald L. Rivest, Michael Szydlo The blocker tag: selective blocking of RFID tags for consumer privacy. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF tree walking, privacy, RFID tags, barcodes
64Daniel Ronzani Why Marketing Short Range Devices as Active Radio Frequency Identifiers Might Backfire. Search on Bibsonomy IOT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF short range device (SRD), active tag, Radio frequency identification (RFID), industry, law, passive tag
64Chir-Ho Chang, Jin-Ling Lin A Systematic Layout Planning of Visualizing Devices on a Non-rectangular Plane by Genetic Heuristics. Search on Bibsonomy IEA/AIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Layout Planning, Genetic Algorithm, RFID, Heuristic Rules
62Ted S. Phillips, Tom Karygiannis, Rick Kuhn Security Standards for the RFID Market. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security standards, RFID, radio frequency identification, RFID tags
62Benjamin C. M. Fung, Ming Cao, Bipin C. Desai, Heng Xu Privacy protection for RFID data. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data mining, anonymity, information sharing, privacy protection, sensitive information
62Lars Kulseng, Zhen Yu, Yawen Wei, Yong Guan Lightweight Secure Search Protocols for Low-cost RFID Systems. Search on Bibsonomy ICDCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
62Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 Secure and Serverless RFID Authentication and Search Protocols. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Tingting Mao, John R. Williams, Abel Sanchez Interoperable internet scale security framework for RFID networks. Search on Bibsonomy ICDE Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Zhibin Zhou 0001, Dijiang Huang SRK: A Distributed RFID Data Access Control Mechanism. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Yijian Bai, Fusheng Wang 0001, Peiya Liu, Carlo Zaniolo, Shaorong Liu RFID Data Processing with a Data Stream Query Language. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 Severless Search and Authentication Protocols for RFID. Search on Bibsonomy PerCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Jie Wu 0006, Dong Wang, Huanye Sheng Design an OSGi Extension Service for Mobile RFID Applications. Search on Bibsonomy ICEBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Xiaolan Joy Zhang, Brian King Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Ari Juels RFID: security and privacy for five-cent wireless devices. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks
60Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EPCglobal networkTM, password-derived key, authentication, RFID, password, encryption algorithm
59Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed S-search: finding RFID tags using scalable and secure search protocol. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF search protocol, security, scalability, RFID, ALOHA
59Ching-Hsien Hsu, Shih-Chang Chen, Chia-Hao Yu, Jong Hyuk Park Alleviating reader collision problem in mobile RFID networks. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Reader collision problem, RFID scheduling, TPDM, Wireless network, Hidden terminal, Anti-collision
59Zhong Ren, Chiu C. Tan 0001, Dong Wang, Qun Li 0001 Experimental Study on Mobile RFID Performance. Search on Bibsonomy WASA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobility, RFID, experimental study
59Evan Welbourne, Karl Koscher, Emad Soroush, Magdalena Balazinska, Gaetano Borriello Longitudinal study of a building-scale RFID ecosystem. Search on Bibsonomy MobiSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF measurement, pervasive computing, rfid
59Einar Sneve Martinussen, Timo Arnall Designing with RFID. Search on Bibsonomy TEI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF applied design, interaction design, RFID, tangible interaction, industrial design
59Xingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan Efficient Complex Event Processing over RFID Data Stream. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID, Data Stream, Complex Event
59Seyed Hossein Siadat, Ali Selamat Location-Based System for Mobile Devices Using RFID. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile devices, RFID, J2ME, user query
59Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm Tagmark: reliable estimations of RFID tags for business processes. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID, estimation, data quality, data cleansing
59Chun-Hee Lee, Chin-Wan Chung Efficient storage scheme and query processing for supply chain management using RFID. Search on Bibsonomy SIGMOD Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF path encoding scheme, region numbering scheme, supply chain management, rfid, prime number
59JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha A New Formal Proof Model for RFID Location Privacy. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF formal proof model, location privacy, RFID security
59Xinchao Zhao, Beihong Jin, Shuang Yu, Zhenyue Long Composite Subscription and Matching Algorithm for RFID Applications. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composite subscription, subscription matching algorithm, RFID applications
59Christoph Angerer, Martin Holzer 0002, Bastian Knerr, Markus Rupp A flexible dual frequency testbed for RFID. Search on Bibsonomy TRIDENTCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dual frequency, RFID, rapid prototyping, testbed, reader
59Xiaolan Joy Zhang, Brian King An Anti-Counterfeiting RFID Privacy Protection Protocol. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, integrity, RFID security
59Nai-Wei Lo, Kuo-Hui Yeh An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, RFID, Data Security, Location Privacy, EPCglobal, CRC
59Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo An Efficient Authentication Protocol for Low-Cost RFID Systems. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Authentication, RFID, location privacy, symmetric encryption
59Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee A Design of Authentication Protocol for Multi-key RFID Tag. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-key, tag structure, RFID, authentication protocol
59Günter Karjoth, Paul A. Moskowitz Disabling RFID tags with visible confirmation: clipped tags are silenced. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID
59Sindhu Karthikeyan, Mikhail Nesterenko RFID security without extensive cryptography. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, privacy, RFID
59David Molnar, David A. Wagner 0001 Privacy and security in library RFID: issues, practices, and architectures. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF private authentication, security, privacy, RFID
59Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer Strong Authentication for RFID Systems Using the AES Algorithm. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES)
57Alex K. Jones, Swapna R. Dontharaju, Shen Chih Tung, Leonid Mats, Peter J. Hawrylak, Raymond R. Hoare, James T. Cain, Marlin H. Mickle Radio frequency identification prototyping. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-power, RFID, prototyping, Design automation
56Geethapriya Venkataramani, Srividya Gopalan Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
56Namje Park, Jooyoung Lee, Howon Kim 0001, Kyoil Chung, Sungwon Sohn A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
56Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung SQL infections through RFID. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID attacks, RFID virus, SQL infections, SQL injections
56Iain A. Currie, Mahesh K. Marina Experimental evaluation of read performance for RFID-based mobile sensor data gathering applications. Search on Bibsonomy MUM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID sensors, RFID-enabled mobile devices, mobile sensor data gathering, smart phones
56Sarah Spiekermann Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation. Search on Bibsonomy UbiComp The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID killfunction, security, privacy, authentication, RFID, identification, user behavior, privacy enhancing technology
55Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Sun Leveraging spatio-temporal redundancy for RFID data cleansing. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF uncertainty, data cleaning, probabilistic algorithms, spatio-temporal databases
55Yingcai Wu, Ka-Kei Chung, Huamin Qu, Xiaoru Yuan, S. C. Cheung 0001 Interactive Visual Optimization and Analysis for RFID Benchmarking. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
55Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann Location Privacy in RFID Applications. Search on Bibsonomy Privacy in Location-Based Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
55Stefanie Jahner, Jan Marco Leimeister, Uta Franziska Knebel, Helmut Krcmar A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Han-Pang Huang, Ying-Ting Chang Robust Design for RFID System Testing and Applications. Search on Bibsonomy ICRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Won-Ju Yoon, Sang-Hwa Chung, Seong-Joon Lee, Young-Sik Moon Design and Implementation of an Active RFID System for Fast Tag Collection. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Qinghan Xiao, Cam Boulet, Thomas E. Gibbons RFID Security Issues in Military Supply Chains. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Christian Floerkemeier, Matthias Lampe, Christof Roduner Facilitating RFID Development with the Accada Prototyping Platform. Search on Bibsonomy PerCom Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim An Analysis of RFID Tag Authentication Protocols Using Secret Value. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 10466 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license