Search

Search Funnelback University

Search powered by Funnelback
1 - 9 of 9 search results for `RFID Tags`
  1. Fully-matching results

  2. Computer Laboratory – Course material 2008–09: Additional Topics

    https://www.cl.cam.ac.uk/teaching/0809/AddTopics/
    21 May 2009: 4]. 2B. The media regularly attack the security and privacy associated with RFID tags. ... Why do they not share the same security issues? 2C. Why are longer range passive RFID tags associated with higher frequencies of operation?
  3. Security Issues in Ubiquitous Computing∗ Frank Stajano 1 Fundamental…

    https://www.cl.cam.ac.uk/~fms27/papers/2008-Stajano-ubiquitous.pdf
    21 Aug 2009: RFID tags have been proposed as electronic price tags allowing automated check-out. ... tags. RFID tags have been proposed as anti-counterfeiting devices. How hard is it toclone them?
  4. Selective Reprogramming of Mobile Sensor Networksthrough Social…

    https://www.cl.cam.ac.uk/~cm542/papers/ewsn10.pdf
    12 Dec 2009: Therefore, therewould be no explicit information on the connectivity between the RFID tags carried bythe animals. ... Pasztor, N. Trigoni,and R. Wohlers. Poster Abstract: Wildlife and Environmental Monitoring using RFID andWSN Technology.
  5. Security of proximity identification systems

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-752.pdf
    18 Jul 2009: 12. 2.2. ‘CONTACTLESS’ TECHNOLOGY 13. of Ultra-High Frequency (UHF) RFID tags. ... In 1999 it was proposed that low-cost UHF RFIDtags’could be used to track items in supply chains.
  6. RFID is X-ray vision

    https://www.cl.cam.ac.uk/~fms27/papers/2005-Stajano-rfid--tr.pdf
    21 Aug 2009: There are indeed many similarities between barcodes and RFID tags—so many that it’seasier just to focus on the differences. ... Rivest and Michael Szydlo. “The Blocker Tag: Selective Block-ing of RFID Tags for Consumer Privacy”.
  7. RFID is x-ray vision

    https://www.cl.cam.ac.uk/~fms27/papers/2005-Stajano-rfid--cacm.pdf
    21 Aug 2009: RFID Is X-Ray VisionIn a world saturated with RFID tags, protecting the privacy of individuals is technically difficult. ... power of the tags, what would we want to happen?My answer is the “ownership-based RFID securitypolicy model,” originally
  8. Foot-driven computing:our first glimpse of location privacy issues…

    https://www.cl.cam.ac.uk/~fms27/papers/2009-Stajano-location.pdf
    19 May 2009: There hasbeen widespread debate on privacy issues raised by RFID tags [11] and location privacy is amongthem. ... What matters most is not so much the specific technology used toacquire the location information (mobile phones, loyalty cards, CCTV cameras,
  9. Selective Reprogramming of Mobile Sensor Networksthrough Social…

    https://mobile-systems.cl.cam.ac.uk/papers/ewsn10.pdf
    12 Dec 2009: Therefore, therewould be no explicit information on the connectivity between the RFID tags carried bythe animals. ... Pasztor, N. Trigoni,and R. Wohlers. Poster Abstract: Wildlife and Environmental Monitoring using RFID andWSN Technology.
  10. Security for volatile FPGAs

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-763.pdf
    27 Nov 2009: G. P. Hancke and S. Drimer. Secure proximity identification for RFID, chapter 9,. ... pages 171–194. Security in RFID and Sensor Networks. Auerbach Publications,. Boca Raton, Florida, USA, 2009.

Refine your results

Related searches for `RFID Tags`

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.