[引用][C] 基于RFID 和EPCglobal 网络的牛肉产品供应链建模及追溯系统

梁万杰, 曹静, 凡燕, 朱科峰, 王支凤, 戴起伟 - 江苏农业学报, 2014

[引用][C] 二维码动态跟踪的血液管理

刘嘉慧 - 物联网技术, 2015

Outdoor upnp for services discovery in smart cities

A Tiberkak, A Hentout, M Aouache… - … Conference on Applied …, 2018 - ieeexplore.ieee.org
Smart cities is a new concept that allows using New Information and Telecommunication
Technologies to make cities smart in order to offer easier life for their citizens. Currently …

A Climbing Plan Sharing System With a Document Converter for Machine-Readable Climbing Plans

A Nohara, S Shiramatsu, T Ozono… - 2015 IIAI 4th …, 2015 - ieeexplore.ieee.org
In this paper, we developed a climbing plan sharing system. While climbing plan documents
created in Microsoft Word or PDF formats contain necessary climbing information, a …

CUIAS-A user identity authentication service for discovery service

P Liu, N Kong, Y Tian, X Lee… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Discovery service (DS) is designed to serve the following lookup function: Given the RFID
identifier of an object, it returns a list of Internet addresses of servers about this object across …

Multi‐attribute‐Based Access Control Policy for Supply Chain Data Service

J Zou, J Lan, X Wang, H Luo - Chinese Journal of Electronics, 2018 - Wiley Online Library
The Electronic product code (EPC) network is established and maintained in worldwide‐
scale based on the EPC standard framework to guarantee the real‐time information …

[PDF][PDF] ENABLING ATTRIBUTE BASED ACCESS CONTROL WITHIN THE INTERNET OF THINGS (IOT)

M Hemdi - 2016 - harvest.usask.ca
With the wide-scale development of the Internet of Things (IoT) and the usage of low-
powered devices (sensors) together with smart devices, numerous people are using IoT …

A Performance Improvement Scheme for Discovery Service

P Liu, N Kong, Y Tian, X Lee, B Yan - Ubiquitous Computing Application …, 2015 - Springer
Abstract Radio Frequency Identification (RFID) tags have been widely used for identifying
objects on a global scale. Discovery service (DS) acting as a broker between objects and …

On RFID False Authentications

K Chiew, Y Li, C Xu - Big Data and Internet of Things: A Roadmap for …, 2014 - Springer
Many reader/tag authentication protocols are proposed to effectively authenticate tags and
readers. However, we demonstrate with YA-TRAP as an example how false authentications …