Search

Search Funnelback University

Search powered by Funnelback
1 - 7 of 7 search results for rfid
  1. Fully-matching results

  2. 13 Nov 2006: Applications:. RFID door access control. road-toll OBU. military friend-foe identification. prisoner tagging. ... 300 kbit/s (faster than most RFID protocols), a bit is 1 km long.
  3. PerSec 2007

    https://www.cl.cam.ac.uk/~fms27/persec-2007/
    11 Dec 2006: Benessa Defend, Kevin Fu and Ari Juels. PerSec-1. _. Public-Key Cryptography for RFID-Tags. ... Yang Cui, Kazukuni Kobara, Kanta Matsuura and Hideki Imai. PerSec-3. _. RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy.
  4. Layout 1

    https://www.cam.ac.uk/system/files/issue_1_research_horizons.pdf
    20 Sep 2006: R E S E A R C H. HORIZONS. The research magazine of the University of Cambridgewww.rsd.cam.ac.ukIssue 1 | October 2006. In this issueNEUROSCIENCE Plus other features and newsfrom around the University. 2 | RESEARCH HORIZONS | October 2006.
  5. PerSec 2005

    https://www.cl.cam.ac.uk/~fms27/persec-2005/
    10 Feb 2006: Session 1: RFID. Stephen A. Weis, "Security Parallels Between People and Pervasive Devices". ... Gildas Avoine, Philippe Oechslin, "A Scalable and Provably Secure Hash-Based RFID Protocol".
  6. Security evaluation at design time for cryptographic hardware

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-665.pdf
    8 May 2006: Technical ReportNumber 665. Computer Laboratory. UCAM-CL-TR-665ISSN 1476-2986. Security evaluation at design timefor cryptographic hardware. Huiyun Li. April 2006. 15 JJ Thomson Avenue. Cambridge CB3 0FD. United Kingdom. phone 44 1223 763500.
  7. So near and yet so far: distance-bounding attacks in wireless networks

    https://www.cl.cam.ac.uk/~mgk25/esas2006-distance.pdf
    27 Oct 2006: 22]1–10. 17. Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol.
  8. location-encryption-persec-v4.1

    https://www.cl.cam.ac.uk/~fms27/persec-2006/goodies/2006-AlmuhtadiHilCamETAL-encryption.pdf
    3 May 2006: RFID tags transmit UWB signals to networked readers and are located using “angle of ar-rival” and “difference of arrival” techniques.

Refine your results

Format

Related searches for rfid

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.