نتایج جستجو برای: rfid tags

تعداد نتایج: 24998  

Journal: :IEEE/ACM Transactions on Networking 2017

2014
Jian Shen Haowen Tan Yang Wang Sai Ji Jin Wang

RFID authentication on large numbers of tags or tag groups has attracted many researchers’ attention as an extension of initial one-or-two-tags scenarios. Due to demands of RFID application in supply chain, various proofs are proposed in the purpose of solving existing problems of grouping tags identification. However, it is proved that verifiers in these proofs are not aware of abnormal relati...

2008
Sheikh I. Ahamed Farzana Rahman Endadul Hoque Fahim Kawsar Tatsuo Nakajima

In the coming pervasive society, Radio Frequency Identification(RFID) Tags will be affixed within every product and object including human. This technology is anticipated to be a major technology which will be utilized by several pervasive services where these tags will be used to identify various objects. However, the use of RFID tags may create new threats to the security and privacy of indiv...

Journal: :Wireless Communications and Mobile Computing 2007
Yang Xiao Senhua Yu Kui Wu Qiang Ni Christopher Janecek Julia Nordstad

A radio frequency identification (RFID) system is a special kind of sensor network to identify an object or a person using radio frequency transmission. A typical RFID system includes transponders (tags) and interrogators (readers): tags are attached to objects/persons, and readers communicate with the tags in their transmission ranges via radio signals. RFID systems have been gaining more and ...

2014
Ramesh Babu

Passive RFID systems used for list organization and benefit tracking normally use contention-based MAC protocols, such as the normal C1G2 protocol. Although the C1G2 protocol has the benefit that it is easy to apply, it suffers from wrongness and relatively low throughput when the number of tags in the network increases. It proposes a token-based MAC protocol called Token-MAC for passive RFID s...

2009
Rishab Nithyanand Gene Tsudik Ersin Uzun

Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent -and still woefully unaddressedchallenges is how to handle re...

2009
Christoph Tribowski Karsten Spin Oliver Günther Olaf Sielemann

The potential of Radio Frequency Identification (RFID) for increasing supply chain efficiency has been repeatedly stressed by practitioners and researchers alike. The cross-company usage of RFID applications can only work if the collaborating companies agree on the syntax and semantic used. EPCglobal, an international industry consortium, has specified a stack of specifications that enable a st...

Journal: :Computer Communications 2009
Alex X. Liu LeRoy A. Bailey

Passive Radio Frequency Identification (RFID) tags, due to their ability to uniquely identify every individual item and low cost, are well suited for supply chain management and are expected to replace barcodes in the near future. However, unlike barcodes, these tags have a longer range in which they are allowed to be scanned, subjecting them to unauthorized scanning by malicious readers and to...

Journal: :IJRFITA 2011
Manmeet Mahinderjit Singh Xue Li Zhanhuai Li

Radio frequency identification-enabled supply chain systems are in an open system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. However, Radio Frequency Identification (RFID) involves growing privacy and s...

2016
Maliha Mahbub

This paper proposes a novel approach to optimize the tag detection, coverage problem and power allocation issues of the RFID reader and tags. We have investigated the effects of variable localization of RFID tags from reader and power loss, inefficiency and distance constraints caused due to equal power allocations to the tags. As an improvement to the situation, implementation of adaptive algo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید