Search

Search Funnelback University

Search powered by Funnelback
1 - 8 of 8 search results for `Using RFID`
  1. Fully-matching results

  2. Computer Laboratory – Course material 2008–09: Additional Topics

    https://www.cl.cam.ac.uk/teaching/0809/AddTopics/
    21 May 2009: And yet the banks are all turning to RFID-based contactless payment cards. ... Questions:. Exercises can be found in the notes. Lecture 8: Security for RFID.
  3. Poster Abstract: Wildlife and Environmental Monitoring usingRFID and…

    https://www.cl.cam.ac.uk/~cm542/papers/sensys09.pdf
    4 Sep 2009: General TermsAlgorithms, Design. KeywordsWireless Sensor Networks, RFID Technology, In-. Network Storage, Duty Cycling. ... We connected an RFID-reader with a Tmote Sky sensornode using a custom-designed extension board - we referto this combination as a
  4. Poster Abstract: Wildlife and Environmental Monitoring usingRFID and…

    https://mobile-systems.cl.cam.ac.uk/papers/sensys09.pdf
    4 Sep 2009: General TermsAlgorithms, Design. KeywordsWireless Sensor Networks, RFID Technology, In-. Network Storage, Duty Cycling. ... We connected an RFID-reader with a Tmote Sky sensornode using a custom-designed extension board - we referto this combination as a
  5. Security of proximity identification systems

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-752.pdf
    18 Jul 2009: This dissertation examines the security of currentproximity identification systems using RFID devices and investigates the use of distance-bounding protocols to make these systems more secure. ... Having already demonstrated that RFID systems were
  6. RFID is X-ray vision

    https://www.cl.cam.ac.uk/~fms27/papers/2005-Stajano-rfid--tr.pdf
    21 Aug 2009: A different way of using RFID tags for price discrimination, namelyregioning, was pointedout by Ross Anderson during one of the discussions of the Computer Lab’s security group atCambridge in 2004. ... Just imagine what is likely to happen in airports
  7. Selective Reprogramming of Mobile Sensor Networksthrough Social…

    https://www.cl.cam.ac.uk/~cm542/papers/ewsn10.pdf
    12 Dec 2009: We evaluate our approach through simulation, using real-world an-imal and human traces. ... Pasztor, N. Trigoni,and R. Wohlers. Poster Abstract: Wildlife and Environmental Monitoring using RFID andWSN Technology.
  8. Selective Reprogramming of Mobile Sensor Networksthrough Social…

    https://mobile-systems.cl.cam.ac.uk/papers/ewsn10.pdf
    12 Dec 2009: We evaluate our approach through simulation, using real-world an-imal and human traces. ... Pasztor, N. Trigoni,and R. Wohlers. Poster Abstract: Wildlife and Environmental Monitoring using RFID andWSN Technology.
  9. Security Issues in Ubiquitous Computing∗ Frank Stajano 1 Fundamental…

    https://www.cl.cam.ac.uk/~fms27/papers/2008-Stajano-ubiquitous.pdf
    21 Aug 2009: 12 Frank Stajano. 2.3 RFID. RFID (radio frequency identification) tags are a crucial development in ubicomp.For our purposes we consider them as low-cost, resource-constrained devices thatcommunicate over ... Can you think of any frauds that the

Refine your results

Related searches for `Using RFID`

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.