RFID tags: privacy and security aspects

DH Shih, CY Lin, B Lin - International Journal of Mobile …, 2005 - inderscienceonline.com
Radio Frequency Identification (RFID) has recently received a lot of attention as an
augmentation technology in manufacturing, SCM, and retail inventory control. However …

[PDF][PDF] Yüksek Lisans Tezi

AİVEİT ANA - 2008 - info-turk.be
Considering the problems of the period when Turkish Left was under discussion, this study
aimed at analyzing the journal Ant by examining the published articles thematically …

Securing inductively-coupled communication

LR Varshney, P Grover, A Sahai - 2012 Information theory and …, 2012 - ieeexplore.ieee.org
Communication over inductively-coupled links is becoming prevalent in service delivery for
medical, financial, and physical security applications and so there is a growing need to …

New foundations for efficient authentication, commutative cryptography, and private disjointness testing

SA Weis - 2006 - dspace.mit.edu
This dissertation presents new constructions and security definitions related to three areas:
authentication, cascadable and commutative crytpography, and private set operations …

Managing RFID data in supply chains

A Melski, L Thoroe… - International Journal of …, 2007 - inderscienceonline.com
The implementation of RFID leads to improved visibility in supply chains. However, as a
consequence of the increased data collection and enhanced data granularity, supply chain …

[PDF][PDF] Peex: Extracting probabilistic events from RFID data

N Khoussainova, M Balazinska… - Proceedings of the 24th …, 2008 - academia.edu
Abstract Radio-Frequency Identification (RFID) technology is increasingly being used to
support various industrial and ubiquitous computing applications. Although this technology …

Finding misplaced items in retail by clustering RFID data

LW Ferreira Chaves, E Buchmann… - Proceedings of the 13th …, 2010 - dl.acm.org
In retail, products are organized according to layout plans, so-called planograms.
Compliance to planograms is important, since good product placement can significantly …

PSNR control for GOP-level constant quality in H. 264 video coding

F De Vito, JC De Martin - Proceedings of the Fifth IEEE …, 2005 - ieeexplore.ieee.org
For some multimedia applications, like storage or surveillance, it may be desirable to
encode the content at constant quality level; the encoder should be aware of media content …

RFID 不确定数据管理技术

许嘉, 于戈, 谷峪, 王艳秋 - 计算机科学与探索, 2009 - cqvip.com
有关不确定数据管理的研究是当前国际数据库研究领域的一个热点. 不确定性作为RFID
系统的一个重要特征, 贯穿于RFID 应用的整个生命周期. RFID 系统主要存在两类不确定性 …

Tagmark: Reliable estimations of RFID tags for business processes

L Weiss Ferreira Chaves, E Buchmann… - Proceedings of the 14th …, 2008 - dl.acm.org
Radio Frequency Identification (RFID) promises optimization of commodity flows in all
industry segments. But due to physical constraints, RFID technology cannot detect all RFID …