Search

Search Funnelback University

Search powered by Funnelback
1 - 10 of 15 search results for rfid
  1. Fully-matching results

  2. Planes ready for take-off in fraction of the time | University of…

    https://www.cam.ac.uk/research/news/planes-ready-for-take-off-in-fraction-of-the-time
    Thumbnail for Planes ready for take-off in fraction of the time | University of Cambridge 6 Jun 2008: This will be the focus of the Cambridge project. The researchers plan to test the use of Radio-Frequency Identification (RFID) tags to provide visibility of different assets used in airport
  3. Attacks on Time-of-Flight Distance Bounding Channels Gerhard P.…

    https://www.cl.cam.ac.uk/~mgk25/wisec08-distance.pdf
    21 Jan 2008: 2.1.2 RFID ReceiversRFID tokens used for proximity authentication use a HF. ... This technique has yetto be practically implemented on resource-limited devices inan RFID environment.
  4. Technical ReportNumber 709 Computer Laboratory UCAM-CL-TR-709ISSN…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-709.pdf
    5 Feb 2008: RFID) tags, Wireless LAN hotspots; widespread adoption of wireless-equipped Personal Digital As-. ... Manyresearchers in pervasive. computing privacy have concentrated on RFID devices, which are processing- and memory-constrained.
  5. ReconfigurableComponent-based Middleware for Networked Embedded…

    https://www.cl.cam.ac.uk/~cm542/papers/jwin.pdf
    29 Feb 2008: ous’ vehices—e.g. those carrying dangerous chemicals—carry RFID tags and are detected and.
  6. Energy-Efficient Sentient Computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-722.pdf
    9 Jul 2008: Technical ReportNumber 722. Computer Laboratory. UCAM-CL-TR-722ISSN 1476-2986. Energy-efficient sentient computing. Mbou Eyole-Monono. July 2008. 15 JJ Thomson Avenue. Cambridge CB3 0FD. United Kingdom. phone 44 1223 763500.
  7. Media Sharing based on Colocation Predictionin Urban Transport Liam…

    https://www.cl.cam.ac.uk/~cm542/papers/mobicom08.pdf
    14 Jul 2008: The use of Radio Frequency Identification(RFID) cards for electronic payment has been introductedin many city’s transport networks over the course of the lastfew years, including Hong Kong’s Octopus,
  8. Technical ReportNumber 709 Computer Laboratory UCAM-CL-TR-709ISSN…

    https://www.cl.cam.ac.uk/research/dtg/archived/files/publications/public/fw242/UCAM-CL-TR-709.pdf
    16 Jul 2008: RFID) tags, Wireless LAN hotspots; widespread adoption of wireless-equipped Personal Digital As-. ... Manyresearchers in pervasive. computing privacy have concentrated on RFID devices, which are processing- and memory-constrained.
  9. Thinking inside the box: system-level failures of tamper proofing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-711.pdf
    26 Feb 2008: Some other issues then require thought– from possible NFC middleperson attacks, through the security of the RFID.
  10. ReconfigurableComponent-based Middleware for Networked Embedded…

    https://mobile-systems.cl.cam.ac.uk/papers/jwin.pdf
    29 Feb 2008: ous’ vehices—e.g. those carrying dangerous chemicals—carry RFID tags and are detected and.
  11. HCI-notes-9-0

    https://www.cl.cam.ac.uk/teaching/0809/HCI/HCI2008.pdf
    12 Sep 2008: Computer Laboratory William Gates Building J J Thomson Avenue Cambridge CB3 0FD E-mail: afb21@cl.cam.ac.uk http://www.cl.cam.ac.uk/afb21/. Human Computer Interaction. Computer Laboratory Part II. Alan Blackwell, 2008–2009.

Refine your results

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.