نتایج جستجو برای: rfid tags

تعداد نتایج: 24998  

2008
Karsten Nohl Toby Berger Benton Calhoun Gabriel Robins

Radio Frequency Identification (RFID) technology bridges the physical and virtual worlds by enabling computers to track the movement of objects. Within a few years, RFID tags will replace barcodes on consumer items to increase the efficiency in logistics processes. The same tags, however, can be used to monitor business processes of competitors and to track individuals by the items they carry o...

2011
Namje Park

In the mobile RFID (Radio-Frequency Identification) environment, scanning RFID tags which are personalized can bring some privacy infringement issues. In spite of the case that private information is not stored in those tags, one can identify entities, analyze their preferences, and track them by collecting data related with the tags and aggregating it. Especially, it might be more serious at t...

2006
Youngjoon Seo Tomoyuki Asano Hyunrok Lee Kwangjo Kim

RFID(Radio Frequency Identification) is now being used in everything for economic feasibility and convenience. In contrast, RFID tags may infringe on user’s privacy. A number of previous schemes exploiting hash function, symmetric cryptographic primitive like AES (Advanced Encryption Standard), asymmetric cryptographic primitive like ECC (Elliptic Curve Cryptosystem) are suitable for high-end R...

2006
Melanie R. Rieback Georgi Gaydadjiev Bruno Crispo Rutger F. H. Hofman Andrew S. Tanenbaum

This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’’ that monitors and controls access to RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for both automated ...

2016
Muhammad Tarmizi Lockman Ali Selamat

As the load of traffic increases in RFID middleware, RFID system can no longer manage the RFID tags. Because of the incapability of the RFID system to handle vast amount of RFID tags, there are possibilities that the data cannot be processed efficiently in the RFID middleware. Implementation of agent technology is useful for verification and validation in RFID system architecture because intell...

2008
Anthony C. Steele Joshua D. Tyson

RFID technology has flourished within the last decade due to its ability to uniquely identify and track objects without line of sight. Its applications extend from supply chain management to livestock management and even to sports event timing. A MATLAB GUI is developed that integrates seamlessly with TI’s RX-MF-RNLK RFID evaluation kit. The software will provide means of demonstrating common R...

2010
Qingyao Luo Benhai Xiong Zhi Geng Liang Yang Jiayi Pan

Due to an assembly line production and poor environment conditions in pig slaughterhouses, collection of slaughter tracing information is not a simple thing. Based on the UHF radio frequency identification (RFID) technologies, this study designed a RFID tag for carcass, a RS232-PS2 data conversion line and some data norms such as the RFID carcass tag and partition meat label norm, and developed...

2017
Rafael V. Aroca André C. Hernandes Daniel V. Magalhães Marcelo Becker Carlos M. P. Vaz Adonai G. Calbo

This paper presents a system to estimate soil moisture through the reading of standard Ultra High Frequency (UHF) passive Radio Frequency Identification (RFID) tags that can be buried in the soil, allowing wireless moisture measurement without the need of using batteries in the field for long periods. In the proposed system, one or more passive EPC/GEN2 tags acts as sensors buried in the soil. ...

2006
Pedro Peris-Lopez Julio César Hernández Castro Juan E. Tapiador Arturo Ribagorda

RFID tags are devices of very limited computational capabilities, which only have 250-3K logic gates that can be devoted to securityrelated tasks. Many proposals have recently appeared, but all of them are based on RFID tags using classical cryptographic primitives such as PRNGs, hash functions, block ciphers, etc. We believe this assumption to be fairly unrealistic, as classical cryptographic ...

2007
Kaushik Dutta Krithi Ramamritham B. Karthik Kamlesh Laddhad

Radio Frequency IDentification (RFID) tags have emerged as a key technology for real-time asset tracking. Wide application of RFID leads to huge amounts of data being generated from scan of each of these RFID tags on individual items, for example, the RFID system of a moderate size retail chain will generate 300 million RFID scans per day. Extracting meaningful information out of this huge amou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید