The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RFID with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2002 (19) 2003 (19) 2004 (100) 2005 (220) 2006 (405) 2007 (692) 2008 (672) 2009 (790) 2010 (650) 2011 (779) 2012 (665) 2013 (616) 2014 (524) 2015 (485) 2016 (420) 2017 (419) 2018 (387) 2019 (62)
Publication types (Num. hits)
article(2992) book(13) incollection(52) inproceedings(4817) phdthesis(35) proceedings(15)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2540 occurrences of 986 keywords

Results
Found 7924 publication records. Showing 7924 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
146Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong Optimization of continuous query processing for RFID sensor tag data stream. Search on Bibsonomy Int. Conf. Interaction Sciences The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID sensor tag, continuous query, RFID system, data stream management system
129Fusheng Wang, Shaorong Liu, Peiya Liu Complex RFID event processing. Search on Bibsonomy VLDB J. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, Temporal, ECA rules, Complex event
127Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom A Framework for Rapid Development of RFID Applications. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF contextual event, RFID application development framework, RFID event, RFID
126Taesu Cheong, Youngil Kim RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
126Fusheng Wang, Shaorong Liu, Peiya Liu, Yijian Bai Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams. Search on Bibsonomy EDBT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
111Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback RFID security and privacy: long-term research or short-term tinkering? Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
111Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park A Security Framework in RFID Multi-domain System. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
108Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseok Choi Framework for Extending RFID Events with Business Rule. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID event, RFID business event, RFID application development framework, RFID, business rule
106Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li RFID privacy: relation between two notions, minimal condition, and efficient construction. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, rfid, pseudorandom function
99Eun Young Choi, Su-Mi Lee, Dong Hoon Lee Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID-tagged Banknotes, Self-updating, Privacy protection
93Shahina Ferdous, Leonidas Fegaras, Fillia Makedon Applying data warehousing technique in pervasive assistive environment. Search on Bibsonomy PETRA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RFID cuboids and hyper cubes, RFID data warehouse, active and passive RFID, cleansed RFID data set, assistive environments
92O-Hoon Choi, Jung-Eun Lim, Hong-Seok Na, Doo-Kwon Baik Modeling for Missing Tissue Compensator Fabrication Using RFID Tag in U-Health. Search on Bibsonomy ISBMDA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RFID, Compensator, Radiation Therapy
90Yusuke Kawamura, Kazunori Shimamura The Network Management Scheme for Effective Consolidation of RFID-Tag Standards. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID tag sensor network, RFID tag standard, RFID network integration standard, RNI Standard Operation Platform
89Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
89Namje Park, Seungjoo Kim, Dongho Won Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. Search on Bibsonomy AWIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
89Song Han, Tharam S. Dillon, Elizabeth Chang 0001 Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
88Young Man Kim Asynchronous Power-Saving Event-Delivery Protocols in Mobile USN. Search on Bibsonomy MSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
87Xiao Jia 0003, Yuan Wenming, Wang Dong Complex event processing model for distributed RFID network. Search on Bibsonomy Int. Conf. Interaction Sciences The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID network, RFID, complex event processing
87Mikyeong Moon, Keunhyuk Yeom Product Line Architecture for RFID-Enabled Applications. Search on Bibsonomy BIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID-enabled application, RFID, software product line, product line architecture
84Thomas Plos Susceptibility of UHF RFID Tags to Electromagnetic Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA)
84Son Le, Xu Huang 0001, Dharmendra Sharma A Multi-agent Architecture for RFID Taxonomy. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF classification, RFID, taxonomy, multi-agent, service-oriented, architecture framework
83Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom Contextual Events Framework in RFID System. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF contextual event, RFID event, high-level event, RFID, RFID middleware
82Kin Seong Leong, Mun Leng Ng, Alfio R. Grasso, Peter H. Cole Synchronization of RFID Readers for Dense RFID Reader Environments. Search on Bibsonomy SAINT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
81Kaushik Dutta, Krithi Ramamritham, B. Karthik, Kamlesh Laddhad Real-Time Event Handling in an RFID Middleware System. Search on Bibsonomy DNIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
81Min Kyu Han, Ilwoo Paik, Byung Hee Lee, Jinpyo Hong A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
81Chae Hoon Lim, Taekyoung Kwon Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
81Hyangjin Lee, Jeeyeon Kim Privacy threats and issues in mobile RFID. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
81Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum Is Your Cat Infected with a Computer Virus?. Search on Bibsonomy PerCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
77Evan Welbourne, Nodira Khoussainova, Julie Letchner, Yang Li, Magdalena Balazinska, Gaetano Borriello, Dan Suciu Cascadia: a system for specifying, detecting, and managing rfid events. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF event specification, pervasive computing, RFID, data management, event detection
77Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum The Evolution of RFID Security. Search on Bibsonomy IEEE Pervasive Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, privacy, radio frequency identification, RFID, history
74Namje Park, Youjin Song, Dongho Won Policy and role based mobile RFID user privacy data management system. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
74Travis Deyle, Charles C. Kemp, Matthew S. Reynolds Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
74Aliasgar Kutiyanawala, Vladimir A. Kulyukin A Cartesian Robot for RFID Signal Distribution Model Verification. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
74Alex K. Jones, Raymond R. Hoare, Swapna R. Dontharaju, Shen Chih Tung, Ralph Sprang, Joshua Fazekas, James T. Cain, Marlin H. Mickle A Field Programmable RFID Tag and Associated Design Flow. Search on Bibsonomy FCCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Ki-Uk Kim, Hyun-Suk Hwang, Bong-Je Kim, Su-Hwan Jeong, Chang Soo Kim The Development of Reliability Verification Tool of RFID Tag for Effective Product Control Systems. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Christian Tellkamp, Thomas Wiechert, Frédéric Thiesse, Elgar Fleisch The Adoption of RFID-based Self-Check-Out-Systems at the Point-of-Sale. Search on Bibsonomy I3E The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Divyan M. Konidala, Kwangjo Kim Mobile RFID Applications and Security Challenges. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung Design and Implementation of Crypto Co-processor and Its Application to Security Systems. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Crypto Algorithm, Power Consumption, Crypto Coprocessor
70Ryoko Ueoka, Atsuji Masuda, Tetsuhiko Murakami, Hideyuki Miyayama, Hidenori Takeuchi, Kazuyuki Hashimoto, Michitaka Hirose Development of RFID Textile and Human Activity Detection Applications. Search on Bibsonomy HCI (13) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID textile, Map making system, Human activity detection
70Harinda Fernando, Jemal H. Abawajy A RFID architecture framework for global supply chain applications. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network, RFID, supply chain, architectural framework
70Lenin Ravindranath, Venkata N. Padmanabhan, Piyush Agrawal Sixthsense: rfid-based enterprise intelligence. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ubiquitous computing, sensing, rfid
70Michael Buettner, Richa Prasad, Alanson P. Sample, Daniel J. Yeager, Ben Greenstein, Joshua R. Smith, David Wetherall RFID sensor networks with the intel WISP. Search on Bibsonomy SenSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, rfid
70Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf Public key based authentication for secure integration of sensor data and RFID. Search on Bibsonomy HeterSanet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, workflow, RFID, sensor, tag, certificate, public key
70Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF guardian proxy, insubvertible encryption, RFID
70Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare Vulnerabilities in First-Generation RFID-enabled Credit Cards. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF contactless, RFID, vulnerabilities, credit cards
70Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi Security and Privacy Analysis of RFID Systems Using Model Checking. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Model Checking, CSP, FDR, RFID Security, Casper
70Batbold Toiruul, KyungOh Lee, HyunJun Lee, YoungHan Lee, Yoon Young Park Mutual-Authentication Mechanism for RFID Systems. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RFID, AES, cryptograph
70David Molnar, Andrea Soppera, David A. Wagner 0001 Privacy for RFID through trusted computing. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID, trusted computing, audit
70Ari Juels, Ronald L. Rivest, Michael Szydlo The blocker tag: selective blocking of RFID tags for consumer privacy. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF tree walking, privacy, RFID tags, barcodes
69Daniel Ronzani Why Marketing Short Range Devices as Active Radio Frequency Identifiers Might Backfire. Search on Bibsonomy IOT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF short range device (SRD), active tag, Radio frequency identification (RFID), industry, law, passive tag
69Chir-Ho Chang, Jin-Ling Lin A Systematic Layout Planning of Visualizing Devices on a Non-rectangular Plane by Genetic Heuristics. Search on Bibsonomy IEA/AIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Layout Planning, Genetic Algorithm, RFID, Heuristic Rules
67Benjamin C. M. Fung, Ming Cao, Bipin C. Desai, Heng Xu Privacy protection for RFID data. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data mining, anonymity, information sharing, privacy protection, sensitive information
67Lars Kulseng, Zhen Yu, Yawen Wei, Yong Guan Lightweight Secure Search Protocols for Low-cost RFID Systems. Search on Bibsonomy ICDCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
67Chiu Chiang Tan, Bo Sheng, Qun Li Secure and Serverless RFID Authentication and Search Protocols. Search on Bibsonomy IEEE Trans. Wireless Communications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Tingting Mao, John R. Williams, Abel Sanchez Interoperable internet scale security framework for RFID networks. Search on Bibsonomy ICDE Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Zhibin Zhou, Dijiang Huang SRK: A Distributed RFID Data Access Control Mechanism. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo, Shaorong Liu RFID Data Processing with a Data Stream Query Language. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Jie Wu 0006, Dong Wang, Huanye Sheng Design an OSGi Extension Service for Mobile RFID Applications. Search on Bibsonomy ICEBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Chiu Chiang Tan, Bo Sheng, Qun Li Severless Search and Authentication Protocols for RFID. Search on Bibsonomy PerCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Xiaolan Joy Zhang, Brian King Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Ari Juels RFID: security and privacy for five-cent wireless devices. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
65Ted S. Phillips, Tom Karygiannis, Rick Huhn Security Standards for the RFID Market. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security standards, RFID, radio frequency identification, RFID tags
65Alexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks
63Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EPCglobal networkTM, password-derived key, authentication, RFID, password, encryption algorithm
62Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed S-search: finding RFID tags using scalable and secure search protocol. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF search protocol, security, scalability, RFID, ALOHA
62Ching-Hsien Hsu, Shih-Chang Chen, Chia-Hao Yu, Jong Hyuk Park Alleviating reader collision problem in mobile RFID networks. Search on Bibsonomy Personal and Ubiquitous Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Reader collision problem, RFID scheduling, TPDM, Wireless network, Hidden terminal, Anti-collision
62Evan Welbourne, Karl Koscher, Emad Soroush, Magdalena Balazinska, Gaetano Borriello Longitudinal study of a building-scale RFID ecosystem. Search on Bibsonomy MobiSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF measurement, pervasive computing, rfid
62Zhong Ren, Chiu Chiang Tan, Dong Wang, Qun Li Experimental Study on Mobile RFID Performance. Search on Bibsonomy WASA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobility, RFID, experimental study
62Einar Sneve Martinussen, Timo Arnall Designing with RFID. Search on Bibsonomy Tangible and Embedded Interaction The full citation details ... 2009 DBLP  DOI  BibTeX  RDF applied design, interaction design, RFID, tangible interaction, industrial design
62Xingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan Efficient Complex Event Processing over RFID Data Stream. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID, Data Stream, Complex Event
62Christoph Angerer, Martin Holzer 0002, Bastian Knerr, Markus Rupp A flexible dual frequency testbed for RFID. Search on Bibsonomy TRIDENTCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dual frequency, RFID, rapid prototyping, testbed, reader
62Chun-Hee Lee, Chin-Wan Chung Efficient storage scheme and query processing for supply chain management using RFID. Search on Bibsonomy SIGMOD Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF path encoding scheme, region numbering scheme, supply chain management, rfid, prime number
62JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha A New Formal Proof Model for RFID Location Privacy. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF formal proof model, location privacy, RFID security
62Xinchao Zhao, Beihong Jin, Shuang Yu, Zhenyue Long Composite Subscription and Matching Algorithm for RFID Applications. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composite subscription, subscription matching algorithm, RFID applications
62Seyed Hossein Siadat, Ali Selamat Location-Based System for Mobile Devices Using RFID. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile devices, RFID, J2ME, user query
62Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm Tagmark: reliable estimations of RFID tags for business processes. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID, estimation, data quality, data cleansing
62Xiaolan Joy Zhang, Brian King An Anti-Counterfeiting RFID Privacy Protection Protocol. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, integrity, RFID security
62Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoonha Lee A Design of Authentication Protocol for Multi-key RFID Tag. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-key, tag structure, RFID, authentication protocol
62Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo An Efficient Authentication Protocol for Low-Cost RFID Systems. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Authentication, RFID, location privacy, symmetric encryption
62Nai-Wei Lo, Kuo-Hui Yeh An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, RFID, Data Security, Location Privacy, EPCglobal, CRC
62Sindhu Karthikeyan, Mikhail Nesterenko RFID security without extensive cryptography. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, privacy, RFID
62Günter Karjoth, Paul A. Moskowitz Disabling RFID tags with visible confirmation: clipped tags are silenced. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID
62David Molnar, David A. Wagner 0001 Privacy and security in library RFID: issues, practices, and architectures. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF private authentication, security, privacy, RFID
62Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer Strong Authentication for RFID Systems Using the AES Algorithm. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES)
62Alex K. Jones, Swapna R. Dontharaju, Shen Chih Tung, Leonid Mats, Peter J. Hawrylak, Raymond R. Hoare, James T. Cain, Marlin H. Mickle Radio frequency identification prototyping. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-power, RFID, prototyping, Design automation
60Geethapriya Venkataramani, Srividya Gopalan Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Namje Park, Jooyoung Lee, Howon Kim, Kyoil Chung, Sungwon Sohn A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
59Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Sun Leveraging spatio-temporal redundancy for RFID data cleansing. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF uncertainty, data cleaning, probabilistic algorithms, spatio-temporal databases
59Yingcai Wu, Ka-Kei Chung, Huamin Qu, Xiaoru Yuan, S. C. Cheung Interactive Visual Optimization and Analysis for RFID Benchmarking. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
59Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann Location Privacy in RFID Applications. Search on Bibsonomy Privacy in Location-Based Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
59Stefanie Jahner, Jan Marco Leimeister, Uta Franziska Knebel, Helmut Krcmar A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
59Han-Pang Huang, Ying-Ting Chang Robust Design for RFID System Testing and Applications. Search on Bibsonomy ICRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Steve Hodges, Alan Thorne, Hugo Mallinson, Christian Floerkemeier Assessing and Optimizing the Range of UHF RFID to Enable Real-World Pervasive Computing Applications. Search on Bibsonomy Pervasive The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Won-Ju Yoon, Sang-Hwa Chung, Seong-Joon Lee, Young-Sik Moon Design and Implementation of an Active RFID System for Fast Tag Collection. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Qinghan Xiao, Cam Boulet, Thomas Gibbons RFID Security Issues in Military Supply Chains. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim An Analysis of RFID Tag Authentication Protocols Using Secret Value. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Christian Floerkemeier, Matthias Lampe, Christof Roduner Facilitating RFID Development with the Accada Prototyping Platform. Search on Bibsonomy PerCom Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Seongjin Kim, Mikyeong Moon, Seonghun Kim, Sunmee Yu, Keunhyuk Yeom RFID Business Aware Framework for Business Process in the EPC Network. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Kyoung Hyun Kim, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 7924 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license