Search
Search Funnelback University
- Refined by:
- Date: 2008
1 -
3 of
3
search results for `RFID system`
Fully-matching results
-
Attacks on Time-of-Flight Distance Bounding Channels Gerhard P.…
https://www.cl.cam.ac.uk/~mgk25/wisec08-distance.pdf21 Jan 2008: 2.1.2 RFID ReceiversRFID tokens used for proximity authentication use a HF. ... fluencing the receiver’s recovered data clock or, in the caseof RFID tokens, the system clock of the prover. -
Media Sharing based on Colocation Predictionin Urban Transport Liam…
https://www.cl.cam.ac.uk/~cm542/papers/mobicom08.pdf14 Jul 2008: This assumes people leave the system soon aftertheir train arrives at their final stop. ... 5.2 Content GenerationIn order to simulate a music sharing system, the tastes. -
Media Sharing based on Colocation Predictionin Urban Transport Liam…
https://mobile-systems.cl.cam.ac.uk/papers/mobicom08.pdf14 Jul 2008: This assumes people leave the system soon aftertheir train arrives at their final stop. ... 5.2 Content GenerationIn order to simulate a music sharing system, the tastes.
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.