Search
Search Funnelback University
- Refined by:
- Date: 2009
1 -
8 of
8
search results for `using RFID`
Fully-matching results
-
Computer Laboratory – Course material 2008–09: Additional Topics
https://www.cl.cam.ac.uk/teaching/0809/AddTopics/21 May 2009: And yet the banks are all turning to RFID-based contactless payment cards. ... Questions:. Exercises can be found in the notes. Lecture 8: Security for RFID. -
Poster Abstract: Wildlife and Environmental Monitoring usingRFID and…
https://www.cl.cam.ac.uk/~cm542/papers/sensys09.pdf4 Sep 2009: General TermsAlgorithms, Design. KeywordsWireless Sensor Networks, RFID Technology, In-. Network Storage, Duty Cycling. ... We connected an RFID-reader with a Tmote Sky sensornode using a custom-designed extension board - we referto this combination as a -
Poster Abstract: Wildlife and Environmental Monitoring usingRFID and…
https://mobile-systems.cl.cam.ac.uk/papers/sensys09.pdf4 Sep 2009: General TermsAlgorithms, Design. KeywordsWireless Sensor Networks, RFID Technology, In-. Network Storage, Duty Cycling. ... We connected an RFID-reader with a Tmote Sky sensornode using a custom-designed extension board - we referto this combination as a -
Security of proximity identification systems
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-752.pdf18 Jul 2009: This dissertation examines the security of currentproximity identification systems using RFID devices and investigates the use of distance-bounding protocols to make these systems more secure. ... Having already demonstrated that RFID systems were -
RFID is X-ray vision
https://www.cl.cam.ac.uk/~fms27/papers/2005-Stajano-rfid--tr.pdf21 Aug 2009: A different way of using RFID tags for price discrimination, namelyregioning, was pointedout by Ross Anderson during one of the discussions of the Computer Lab’s security group atCambridge in 2004. ... Just imagine what is likely to happen in airports -
Selective Reprogramming of Mobile Sensor Networksthrough Social…
https://www.cl.cam.ac.uk/~cm542/papers/ewsn10.pdf12 Dec 2009: We evaluate our approach through simulation, using real-world an-imal and human traces. ... Pasztor, N. Trigoni,and R. Wohlers. Poster Abstract: Wildlife and Environmental Monitoring using RFID andWSN Technology. -
Selective Reprogramming of Mobile Sensor Networksthrough Social…
https://mobile-systems.cl.cam.ac.uk/papers/ewsn10.pdf12 Dec 2009: We evaluate our approach through simulation, using real-world an-imal and human traces. ... Pasztor, N. Trigoni,and R. Wohlers. Poster Abstract: Wildlife and Environmental Monitoring using RFID andWSN Technology. -
Security Issues in Ubiquitous Computing∗ Frank Stajano 1 Fundamental…
https://www.cl.cam.ac.uk/~fms27/papers/2008-Stajano-ubiquitous.pdf21 Aug 2009: 12 Frank Stajano. 2.3 RFID. RFID (radio frequency identification) tags are a crucial development in ubicomp.For our purposes we consider them as low-cost, resource-constrained devices thatcommunicate over ... Can you think of any frauds that the
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.