|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2540 occurrences of 986 keywords
|
|
|
Results
Found 10466 publication records. Showing 10466 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
136 | Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong |
Optimization of continuous query processing for RFID sensor tag data stream. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
RFID sensor tag, continuous query, RFID system, data stream management system |
120 | Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom |
A Framework for Rapid Development of RFID Applications. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
contextual event, RFID application development framework, RFID event, RFID |
119 | Fusheng Wang 0001, Shaorong Liu, Peiya Liu |
Complex RFID event processing. |
VLDB J. |
2009 |
DBLP DOI BibTeX RDF |
RFID, Temporal, ECA rules, Complex event |
118 | Taesu Cheong, Youngil Kim |
RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation. |
OTM Conferences (1) |
2005 |
DBLP DOI BibTeX RDF |
|
115 | Fusheng Wang 0001, Shaorong Liu, Peiya Liu, Yijian Bai |
Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams. |
EDBT |
2006 |
DBLP DOI BibTeX RDF |
|
103 | Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseok Choi |
Framework for Extending RFID Events with Business Rule. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
RFID event, RFID business event, RFID application development framework, RFID, business rule |
102 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback |
RFID security and privacy: long-term research or short-term tinkering? |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
|
102 | Dong Seong Kim 0001, Taek-Hyun Shin, Jong Sou Park |
A Security Framework in RFID Multi-domain System. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
99 | Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li |
RFID privacy: relation between two notions, minimal condition, and efficient construction. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy, rfid, pseudorandom function |
92 | Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 |
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
RFID-tagged Banknotes, Self-updating, Privacy protection |
88 | Shahina Ferdous, Leonidas Fegaras, Fillia Makedon |
Applying data warehousing technique in pervasive assistive environment. |
PETRA |
2010 |
DBLP DOI BibTeX RDF |
RFID cuboids and hyper cubes, RFID data warehouse, active and passive RFID, cleansed RFID data set, assistive environments |
86 | Yusuke Kawamura, Kazunori Shimamura |
The Network Management Scheme for Effective Consolidation of RFID-Tag Standards. |
APNOMS |
2009 |
DBLP DOI BibTeX RDF |
RFID tag sensor network, RFID tag standard, RFID network integration standard, RNI Standard Operation Platform |
85 | O-Hoon Choi, Jung-Eun Lim, Hong-Seok Na, Doo-Kwon Baik |
Modeling for Missing Tissue Compensator Fabrication Using RFID Tag in U-Health. |
ISBMDA |
2006 |
DBLP DOI BibTeX RDF |
RFID, Compensator, Radiation Therapy |
83 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Xiao Jia 0003, Yuan Wenming, Wang Dong |
Complex event processing model for distributed RFID network. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
RFID network, RFID, complex event processing |
82 | Mikyeong Moon, Keunhyuk Yeom |
Product Line Architecture for RFID-Enabled Applications. |
BIS |
2007 |
DBLP DOI BibTeX RDF |
RFID-enabled application, RFID, software product line, product line architecture |
82 | Namje Park, Seungjoo Kim, Dongho Won |
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. |
AWIC |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Song Han 0004, Tharam S. Dillon, Elizabeth Chang 0001 |
Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. |
MSN |
2007 |
DBLP DOI BibTeX RDF |
|
80 | Young Man Kim |
Asynchronous Power-Saving Event-Delivery Protocols in Mobile USN. |
MSN |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom |
Contextual Events Framework in RFID System. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
contextual event, RFID event, high-level event, RFID, RFID middleware |
79 | Thomas Plos |
Susceptibility of UHF RFID Tags to Electromagnetic Analysis. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA) |
79 | Son Le, Xu Huang 0001, Dharmendra Sharma 0001 |
A Multi-agent Architecture for RFID Taxonomy. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
classification, RFID, taxonomy, multi-agent, service-oriented, architecture framework |
76 | Kin Seong Leong, Mun Leng Ng, Alfio R. Grasso, Peter H. Cole |
Synchronization of RFID Readers for Dense RFID Reader Environments. |
SAINT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Kaushik Dutta, Krithi Ramamritham, B. Karthik, Kamlesh Laddhad |
Real-Time Event Handling in an RFID Middleware System. |
DNIS |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Min Kyu Han, Ilwoo Paik, Byung Hee Lee, Jinpyo Hong |
A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Hyangjin Lee, Jeeyeon Kim |
Privacy threats and issues in mobile RFID. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Chae Hoon Lim, Taekyoung Kwon 0002 |
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
Is Your Cat Infected with a Computer Virus?. |
PerCom |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Evan Welbourne, Nodira Khoussainova, Julie Letchner, Yang Li 0059, Magdalena Balazinska, Gaetano Borriello, Dan Suciu |
Cascadia: a system for specifying, detecting, and managing rfid events. |
MobiSys |
2008 |
DBLP DOI BibTeX RDF |
event specification, pervasive computing, RFID, data management, event detection |
72 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
The Evolution of RFID Security. |
IEEE Pervasive Comput. |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, radio frequency identification, RFID, history |
68 | Travis Deyle, Charles C. Kemp, Matthew S. Reynolds |
Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model. |
IROS |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Namje Park, Youjin Song, Dongho Won |
Policy and role based mobile RFID user privacy data management system. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Aliasgar Kutiyanawala, Vladimir A. Kulyukin |
A Cartesian Robot for RFID Signal Distribution Model Verification. |
UIC |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Christian Tellkamp, Thomas Wiechert, Frédéric Thiesse, Elgar Fleisch |
The Adoption of RFID-based Self-Check-Out-Systems at the Point-of-Sale. |
I3E |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Alex K. Jones, Raymond R. Hoare, Swapna R. Dontharaju, Shen Chih Tung, Ralph Sprang, Joshua Fazekas, James T. Cain, Marlin H. Mickle |
A Field Programmable RFID Tag and Associated Design Flow. |
FCCM |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Divyan M. Konidala, Kwangjo Kim |
Mobile RFID Applications and Security Challenges. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Ki-Uk Kim, Hyun-Suk Hwang, Bong-Je Kim, Su-Hwan Jeong, Chang Soo Kim |
The Development of Reliability Verification Tool of RFID Tag for Effective Product Control Systems. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Howon Kim 0001, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung |
Design and Implementation of Crypto Co-processor and Its Application to Security Systems. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
Crypto Algorithm, Power Consumption, Crypto Coprocessor |
65 | Ryoko Ueoka, Atsuji Masuda, Tetsuhiko Murakami, Hideyuki Miyayama, Hidenori Takeuchi, Kazuyuki Hashimoto, Michitaka Hirose |
Development of RFID Textile and Human Activity Detection Applications. |
HCI (13) |
2009 |
DBLP DOI BibTeX RDF |
RFID textile, Map making system, Human activity detection |
65 | Harinda Fernando, Jemal H. Abawajy |
A RFID architecture framework for global supply chain applications. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
network, RFID, supply chain, architectural framework |
65 | Michael Buettner, Richa Prasad, Alanson P. Sample, Daniel J. Yeager, Ben Greenstein, Joshua R. Smith 0001, David Wetherall |
RFID sensor networks with the intel WISP. |
SenSys |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, rfid |
65 | Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf |
Public key based authentication for secure integration of sensor data and RFID. |
HeterSanet |
2008 |
DBLP DOI BibTeX RDF |
authentication, workflow, RFID, sensor, tag, certificate, public key |
65 | Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
guardian proxy, insubvertible encryption, RFID |
65 | Lenin Ravindranath, Venkata N. Padmanabhan, Piyush Agrawal |
Sixthsense: rfid-based enterprise intelligence. |
MobiSys |
2008 |
DBLP DOI BibTeX RDF |
ubiquitous computing, sensing, rfid |
65 | Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare |
Vulnerabilities in First-Generation RFID-enabled Credit Cards. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
contactless, RFID, vulnerabilities, credit cards |
65 | Hyun Seok Kim, Il-Gon Kim, Keun-Hee Han, Jin-Young Choi |
Security and Privacy Analysis of RFID Systems Using Model Checking. |
HPCC |
2006 |
DBLP DOI BibTeX RDF |
Model Checking, CSP, FDR, RFID Security, Casper |
65 | Batbold Toiruul, KyungOh Lee, HyunJun Lee, YoungHan Lee, Yoon Young Park |
Mutual-Authentication Mechanism for RFID Systems. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
RFID, AES, cryptograph |
65 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
Privacy for RFID through trusted computing. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID, trusted computing, audit |
65 | Ari Juels, Ronald L. Rivest, Michael Szydlo |
The blocker tag: selective blocking of RFID tags for consumer privacy. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
tree walking, privacy, RFID tags, barcodes |
64 | Daniel Ronzani |
Why Marketing Short Range Devices as Active Radio Frequency Identifiers Might Backfire. |
IOT |
2008 |
DBLP DOI BibTeX RDF |
short range device (SRD), active tag, Radio frequency identification (RFID), industry, law, passive tag |
64 | Chir-Ho Chang, Jin-Ling Lin |
A Systematic Layout Planning of Visualizing Devices on a Non-rectangular Plane by Genetic Heuristics. |
IEA/AIE |
2007 |
DBLP DOI BibTeX RDF |
Layout Planning, Genetic Algorithm, RFID, Heuristic Rules |
62 | Ted S. Phillips, Tom Karygiannis, Rick Kuhn |
Security Standards for the RFID Market. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
security standards, RFID, radio frequency identification, RFID tags |
62 | Benjamin C. M. Fung, Ming Cao, Bipin C. Desai, Heng Xu |
Privacy protection for RFID data. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
data mining, anonymity, information sharing, privacy protection, sensitive information |
62 | Lars Kulseng, Zhen Yu, Yawen Wei, Yong Guan |
Lightweight Secure Search Protocols for Low-cost RFID Systems. |
ICDCS |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
Secure and Serverless RFID Authentication and Search Protocols. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Tingting Mao, John R. Williams, Abel Sanchez |
Interoperable internet scale security framework for RFID networks. |
ICDE Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Zhibin Zhou 0001, Dijiang Huang |
SRK: A Distributed RFID Data Access Control Mechanism. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Yijian Bai, Fusheng Wang 0001, Peiya Liu, Carlo Zaniolo, Shaorong Liu |
RFID Data Processing with a Data Stream Query Language. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
Severless Search and Authentication Protocols for RFID. |
PerCom |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Jie Wu 0006, Dong Wang, Huanye Sheng |
Design an OSGi Extension Service for Mobile RFID Applications. |
ICEBE |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Xiaolan Joy Zhang, Brian King |
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Ari Juels |
RFID: security and privacy for five-cent wireless devices. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno |
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks |
60 | Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won |
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. |
ICHIT |
2006 |
DBLP DOI BibTeX RDF |
EPCglobal networkTM, password-derived key, authentication, RFID, password, encryption algorithm |
59 | Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed |
S-search: finding RFID tags using scalable and secure search protocol. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
search protocol, security, scalability, RFID, ALOHA |
59 | Ching-Hsien Hsu, Shih-Chang Chen, Chia-Hao Yu, Jong Hyuk Park |
Alleviating reader collision problem in mobile RFID networks. |
Pers. Ubiquitous Comput. |
2009 |
DBLP DOI BibTeX RDF |
Reader collision problem, RFID scheduling, TPDM, Wireless network, Hidden terminal, Anti-collision |
59 | Zhong Ren, Chiu C. Tan 0001, Dong Wang, Qun Li 0001 |
Experimental Study on Mobile RFID Performance. |
WASA |
2009 |
DBLP DOI BibTeX RDF |
mobility, RFID, experimental study |
59 | Evan Welbourne, Karl Koscher, Emad Soroush, Magdalena Balazinska, Gaetano Borriello |
Longitudinal study of a building-scale RFID ecosystem. |
MobiSys |
2009 |
DBLP DOI BibTeX RDF |
measurement, pervasive computing, rfid |
59 | Einar Sneve Martinussen, Timo Arnall |
Designing with RFID. |
TEI |
2009 |
DBLP DOI BibTeX RDF |
applied design, interaction design, RFID, tangible interaction, industrial design |
59 | Xingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan |
Efficient Complex Event Processing over RFID Data Stream. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
RFID, Data Stream, Complex Event |
59 | Seyed Hossein Siadat, Ali Selamat |
Location-Based System for Mobile Devices Using RFID. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
mobile devices, RFID, J2ME, user query |
59 | Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm |
Tagmark: reliable estimations of RFID tags for business processes. |
KDD |
2008 |
DBLP DOI BibTeX RDF |
RFID, estimation, data quality, data cleansing |
59 | Chun-Hee Lee, Chin-Wan Chung |
Efficient storage scheme and query processing for supply chain management using RFID. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
path encoding scheme, region numbering scheme, supply chain management, rfid, prime number |
59 | JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha |
A New Formal Proof Model for RFID Location Privacy. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
formal proof model, location privacy, RFID security |
59 | Xinchao Zhao, Beihong Jin, Shuang Yu, Zhenyue Long |
Composite Subscription and Matching Algorithm for RFID Applications. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
composite subscription, subscription matching algorithm, RFID applications |
59 | Christoph Angerer, Martin Holzer 0002, Bastian Knerr, Markus Rupp |
A flexible dual frequency testbed for RFID. |
TRIDENTCOM |
2008 |
DBLP DOI BibTeX RDF |
dual frequency, RFID, rapid prototyping, testbed, reader |
59 | Xiaolan Joy Zhang, Brian King |
An Anti-Counterfeiting RFID Privacy Protection Protocol. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
privacy, integrity, RFID security |
59 | Nai-Wei Lo, Kuo-Hui Yeh |
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Data Security, Location Privacy, EPCglobal, CRC |
59 | Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo |
An Efficient Authentication Protocol for Low-Cost RFID Systems. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
security, Authentication, RFID, location privacy, symmetric encryption |
59 | Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee |
A Design of Authentication Protocol for Multi-key RFID Tag. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
multi-key, tag structure, RFID, authentication protocol |
59 | Günter Karjoth, Paul A. Moskowitz |
Disabling RFID tags with visible confirmation: clipped tags are silenced. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID |
59 | Sindhu Karthikeyan, Mikhail Nesterenko |
RFID security without extensive cryptography. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, RFID |
59 | David Molnar, David A. Wagner 0001 |
Privacy and security in library RFID: issues, practices, and architectures. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
private authentication, security, privacy, RFID |
59 | Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
Strong Authentication for RFID Systems Using the AES Algorithm. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES) |
57 | Alex K. Jones, Swapna R. Dontharaju, Shen Chih Tung, Leonid Mats, Peter J. Hawrylak, Raymond R. Hoare, James T. Cain, Marlin H. Mickle |
Radio frequency identification prototyping. |
ACM Trans. Design Autom. Electr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
low-power, RFID, prototyping, Design automation |
56 | Geethapriya Venkataramani, Srividya Gopalan |
Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Namje Park, Jooyoung Lee, Howon Kim 0001, Kyoil Chung, Sungwon Sohn |
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System). |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung |
SQL infections through RFID. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
RFID attacks, RFID virus, SQL infections, SQL injections |
56 | Iain A. Currie, Mahesh K. Marina |
Experimental evaluation of read performance for RFID-based mobile sensor data gathering applications. |
MUM |
2008 |
DBLP DOI BibTeX RDF |
RFID sensors, RFID-enabled mobile devices, mobile sensor data gathering, smart phones |
56 | Sarah Spiekermann |
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation. |
UbiComp |
2007 |
DBLP DOI BibTeX RDF |
RFID killfunction, security, privacy, authentication, RFID, identification, user behavior, privacy enhancing technology |
55 | Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Sun |
Leveraging spatio-temporal redundancy for RFID data cleansing. |
SIGMOD Conference |
2010 |
DBLP DOI BibTeX RDF |
uncertainty, data cleaning, probabilistic algorithms, spatio-temporal databases |
55 | Yingcai Wu, Ka-Kei Chung, Huamin Qu, Xiaoru Yuan, S. C. Cheung 0001 |
Interactive Visual Optimization and Analysis for RFID Benchmarking. |
IEEE Trans. Vis. Comput. Graph. |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
Location Privacy in RFID Applications. |
Privacy in Location-Based Applications |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Stefanie Jahner, Jan Marco Leimeister, Uta Franziska Knebel, Helmut Krcmar |
A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Han-Pang Huang, Ying-Ting Chang |
Robust Design for RFID System Testing and Applications. |
ICRA |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Won-Ju Yoon, Sang-Hwa Chung, Seong-Joon Lee, Young-Sik Moon |
Design and Implementation of an Active RFID System for Fast Tag Collection. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Qinghan Xiao, Cam Boulet, Thomas E. Gibbons |
RFID Security Issues in Military Supply Chains. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Christian Floerkemeier, Matthias Lampe, Christof Roduner |
Facilitating RFID Development with the Accada Prototyping Platform. |
PerCom Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim |
An Analysis of RFID Tag Authentication Protocols Using Secret Value. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 10466 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|