-
1
-
-
84933392900
-
Communication by means of reflected power
-
Stockman H. Communication by means of reflected power. Proc. IRE 35 (1948) 1196-1204
-
(1948)
Proc. IRE
, vol.35
, pp. 1196-1204
-
-
Stockman, H.1
-
2
-
-
33847741124
-
The history of rfid
-
Landt J. The history of rfid. IEEE Potentials 24 4 (2005) 8-11
-
(2005)
IEEE Potentials
, vol.24
, Issue.4
, pp. 8-11
-
-
Landt, J.1
-
5
-
-
34948883343
-
Ubiquitous computing in the real world: Lessons learnt from large scale rfid deployments
-
Konomi S., and Roussos G. Ubiquitous computing in the real world: Lessons learnt from large scale rfid deployments. Pers. Ubiq. Comp. 11 7 (2007) 507-521
-
(2007)
Pers. Ubiq. Comp.
, vol.11
, Issue.7
, pp. 507-521
-
-
Konomi, S.1
Roussos, G.2
-
6
-
-
32844455542
-
LotTrack: rfid-based process control in the semiconductor industry
-
Thiesse F., Fleisch E., and Dierkes M. LotTrack: rfid-based process control in the semiconductor industry. IEEE Perv. Comp. 5 1 (2006) 47-53
-
(2006)
IEEE Perv. Comp.
, vol.5
, Issue.1
, pp. 47-53
-
-
Thiesse, F.1
Fleisch, E.2
Dierkes, M.3
-
7
-
-
32844471705
-
rfid-based maintenance at Frankfurt airport
-
Legner C., and Thiesse F. rfid-based maintenance at Frankfurt airport. IEEE Perv. Comp. 5 1 (2006) 34-39
-
(2006)
IEEE Perv. Comp.
, vol.5
, Issue.1
, pp. 34-39
-
-
Legner, C.1
Thiesse, F.2
-
8
-
-
33646529166
-
Appliance design for mobile commerce and retailteinment
-
Roussos G., Kourouthanassis P., and Moussouri T. Appliance design for mobile commerce and retailteinment. Per. Ubiq. Comp. 7 3-4 (2003) 203-209
-
(2003)
Per. Ubiq. Comp.
, vol.7
, Issue.3-4
, pp. 203-209
-
-
Roussos, G.1
Kourouthanassis, P.2
Moussouri, T.3
-
10
-
-
84964520974
-
The networked physical world: An automated identification architecture
-
IEEE Press
-
Engels D.W., Foley J., Waldrop J., Sarma S., and Brock D. The networked physical world: An automated identification architecture. Proc. WIAPP 2001 (2001), IEEE Press 76-77
-
(2001)
Proc. WIAPP 2001
, pp. 76-77
-
-
Engels, D.W.1
Foley, J.2
Waldrop, J.3
Sarma, S.4
Brock, D.5
-
13
-
-
32844471136
-
An introduction to rfid technology
-
Want R. An introduction to rfid technology. IEEE Perv. Comp. 5 1 (2006) 25-33
-
(2006)
IEEE Perv. Comp.
, vol.5
, Issue.1
, pp. 25-33
-
-
Want, R.1
-
16
-
-
84892276852
-
-
Springer, Berlin
-
Curty J.-P., Declercq M., Dehollain C., and Joehl N. Design and Optimization of Passive UHF rfid Systems (2006), Springer, Berlin
-
(2006)
Design and Optimization of Passive UHF rfid Systems
-
-
Curty, J.-P.1
Declercq, M.2
Dehollain, C.3
Joehl, N.4
-
17
-
-
33845496090
-
A model-driven approach to rfid application programming and infrastructure management
-
IEEE Press
-
Chen H., Chou P.B., Duri S., Elliott J.G., Reason J.M., and Wong D.C. A model-driven approach to rfid application programming and infrastructure management. Proc. ICEBE05 (2005), IEEE Press 256-259
-
(2005)
Proc. ICEBE05
, pp. 256-259
-
-
Chen, H.1
Chou, P.B.2
Duri, S.3
Elliott, J.G.4
Reason, J.M.5
Wong, D.C.6
-
18
-
-
49949099750
-
-
IBM Redbooks, Raleigh
-
Chamberlain J., Blanchard C., Burlingame S., Chandramohan S., Forestier E., Griffith G., Mazzara M.L., Musti S., Son S.-I., Stump G., and Weiss C. IBM WebSphere rfid Handbook: A Solution Guide (2006), IBM Redbooks, Raleigh
-
(2006)
IBM WebSphere rfid Handbook: A Solution Guide
-
-
Chamberlain, J.1
Blanchard, C.2
Burlingame, S.3
Chandramohan, S.4
Forestier, E.5
Griffith, G.6
Mazzara, M.L.7
Musti, S.8
Son, S.-I.9
Stump, G.10
Weiss, C.11
-
19
-
-
0036099499
-
Virtual organizations, pervasive computing, and an infrastructure for networking at the edge
-
Waldo J. Virtual organizations, pervasive computing, and an infrastructure for networking at the edge. Inf. Sys. Frontiers 4 1 (2002) 9-18
-
(2002)
Inf. Sys. Frontiers
, vol.4
, Issue.1
, pp. 9-18
-
-
Waldo, J.1
-
21
-
-
33947176178
-
Opportunistic Networking: Data forwarding in disconnected mobile ad hoc networks
-
Pelusi L., Passarella A., and Conti M. Opportunistic Networking: Data forwarding in disconnected mobile ad hoc networks. IEEE Comm. Mag. 44 11 (2006) 134-141
-
(2006)
IEEE Comm. Mag.
, vol.44
, Issue.11
, pp. 134-141
-
-
Pelusi, L.1
Passarella, A.2
Conti, M.3
-
22
-
-
84893392013
-
Haggle: A networking architecture designed around mobile users
-
Springer, Berlin
-
Scott J., Hui P., Crowcroft J., and Diot C. Haggle: A networking architecture designed around mobile users. Proc. IFIP WONS 2006 (2006), Springer, Berlin
-
(2006)
Proc. IFIP WONS 2006
-
-
Scott, J.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
-
23
-
-
0033296997
-
Application level active networking
-
Fry M., and Ghosh A. Application level active networking. Comp. Net. 31 (1999) 655-667
-
(1999)
Comp. Net.
, vol.31
, pp. 655-667
-
-
Fry, M.1
Ghosh, A.2
-
24
-
-
58649095352
-
Linking sensor data to context-aware applications using abstract events
-
Katsiri E., Bacon J., and Mycroft A. Linking sensor data to context-aware applications using abstract events. J. Perv. Comp. Syst. (2007)
-
(2007)
J. Perv. Comp. Syst.
-
-
Katsiri, E.1
Bacon, J.2
Mycroft, A.3
-
25
-
-
1442277881
-
-
K. Shindo, N. Koshizuka, K. Sakamura, Large-scale ubiquitous information system for digital museum, in: Proc. IASTED03, 2003
-
K. Shindo, N. Koshizuka, K. Sakamura, Large-scale ubiquitous information system for digital museum, in: Proc. IASTED03, 2003
-
-
-
-
26
-
-
84889341471
-
Winrfid A middleware for the enablement of radio frequency identification (rfid) based applications
-
Shorey R., Choon C.M., Tsang O.W., and Ananda A. (Eds), Wiley-IEEE Press
-
Prabhu B.S., Su X., Ramamurthy H., Chu C.-C., and Gadh R. Winrfid A middleware for the enablement of radio frequency identification (rfid) based applications. In: Shorey R., Choon C.M., Tsang O.W., and Ananda A. (Eds). Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions (2006), Wiley-IEEE Press
-
(2006)
Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions
-
-
Prabhu, B.S.1
Su, X.2
Ramamurthy, H.3
Chu, C.-C.4
Gadh, R.5
-
27
-
-
77951571790
-
Efficient object identification with passive rfid tags
-
Proc. Pervasive 2002
-
Vogt H. Efficient object identification with passive rfid tags. Proc. Pervasive 2002. Lecture Notes Computer Science vol. 2414 (2002) 98-113
-
(2002)
Lecture Notes Computer Science
, vol.2414
, pp. 98-113
-
-
Vogt, H.1
-
28
-
-
33745621088
-
-
F. Wang, P. Liu, Temporal management of rfid data, in: Proc. VLDB05, 2005, pp. 1128-1139
-
F. Wang, P. Liu, Temporal management of rfid data, in: Proc. VLDB05, 2005, pp. 1128-1139
-
-
-
-
29
-
-
77953839620
-
rfid middleware design-Addressing application requirements and rfid constraints
-
Proc. SOC-EUSAI
-
Floerkemeier C., and Lampe M. rfid middleware design-Addressing application requirements and rfid constraints. Proc. SOC-EUSAI. ACM International Conference Proceeding Series vol. 121 (2005) 219-224
-
(2005)
ACM International Conference Proceeding Series
, vol.121
, pp. 219-224
-
-
Floerkemeier, C.1
Lampe, M.2
-
30
-
-
5544240763
-
Smart identification frameworks for ubiquitous computing applications
-
Römer K., Schoch T., Mattern F., and Dübendorfer T. Smart identification frameworks for ubiquitous computing applications. Wireless Networks 10 6 (2004) 689-700
-
(2004)
Wireless Networks
, vol.10
, Issue.6
, pp. 689-700
-
-
Römer, K.1
Schoch, T.2
Mattern, F.3
Dübendorfer, T.4
-
31
-
-
33749169806
-
Architecting rfid middleware
-
Hoag J.E., and Thompson C.W. Architecting rfid middleware. IEEE Int. Comp. 10 5 (2006) 88-92
-
(2006)
IEEE Int. Comp.
, vol.10
, Issue.5
, pp. 88-92
-
-
Hoag, J.E.1
Thompson, C.W.2
-
32
-
-
33745875017
-
A framework for rapid development of rfid applications
-
Proc. ICCSA 2006
-
Kim Y., Moon M., and Yeom K. A framework for rapid development of rfid applications. Proc. ICCSA 2006. Lecture Notes in Computer Science vol. 3983 (2006) 226-235
-
(2006)
Lecture Notes in Computer Science
, vol.3983
, pp. 226-235
-
-
Kim, Y.1
Moon, M.2
Yeom, K.3
-
33
-
-
58649107711
-
-
M. Mealling, Dynamic delegation discovery system (DDDS) part three: The domain name system (DNS) database (IETF 2002)
-
M. Mealling, Dynamic delegation discovery system (DDDS) part three: The domain name system (DNS) database (IETF 2002)
-
-
-
-
34
-
-
38149039357
-
Is near-field communication close to success?
-
Ortiz Jr. S. Is near-field communication close to success?. IEEE Comp. 39 3 (2006) 18-20
-
(2006)
IEEE Comp.
, vol.39
, Issue.3
, pp. 18-20
-
-
Ortiz Jr., S.1
-
35
-
-
44149099407
-
Short-range wireless technologies with mobile payments systems
-
ACM Press
-
Chen J.J., and Adams C. Short-range wireless technologies with mobile payments systems. Proc. ICEC '04 (2004), ACM Press 649-656
-
(2004)
Proc. ICEC '04
, pp. 649-656
-
-
Chen, J.J.1
Adams, C.2
-
36
-
-
33749007148
-
Bridging the physical and virtual worlds by local connectivity-based physical selection
-
Ailisto H., Pohjanheimo L., Välkkynen P., Strömmer E., Tuomisto T., and Korhonen I. Bridging the physical and virtual worlds by local connectivity-based physical selection. Pers. Ubiq. Comp. 10 6 (2006) 334-344
-
(2006)
Pers. Ubiq. Comp.
, vol.10
, Issue.6
, pp. 334-344
-
-
Ailisto, H.1
Pohjanheimo, L.2
Välkkynen, P.3
Strömmer, E.4
Tuomisto, T.5
Korhonen, I.6
-
37
-
-
34748865983
-
Body movements: Gesture connect: Facilitating tangible interaction with a flick of the wrist
-
ACM Press
-
Pering T., Anokwa Y., and Want R. Body movements: Gesture connect: Facilitating tangible interaction with a flick of the wrist. Proc.TEI07 (2007), ACM Press 259-262
-
(2007)
Proc.TEI07
, pp. 259-262
-
-
Pering, T.1
Anokwa, Y.2
Want, R.3
-
38
-
-
32844469407
-
Requesting pervasive service by touching rfid tags
-
Riekki J., Salminen T., and Alakarppa I. Requesting pervasive service by touching rfid tags. IEEE Perv. Comp. 5 1 (2006) 40-46
-
(2006)
IEEE Perv. Comp.
, vol.5
, Issue.1
, pp. 40-46
-
-
Riekki, J.1
Salminen, T.2
Alakarppa, I.3
-
39
-
-
33750945450
-
rfid code structure and tag data structure for mobile rfid services in Korea
-
Lee J.S., and Kim H.J. rfid code structure and tag data structure for mobile rfid services in Korea. Proc. ICACT 2006 vol. 2 (2006) 3-6
-
(2006)
Proc. ICACT 2006
, vol.2
, pp. 3-6
-
-
Lee, J.S.1
Kim, H.J.2
-
40
-
-
20844459862
-
rfid privacy: An overview of problems and proposed solutions
-
Garfinkel S.L., Juels A., and Pappu R. rfid privacy: An overview of problems and proposed solutions. IEEE Security and Privacy 3 3 (2005) 34-43
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
41
-
-
33144457479
-
RIFD security and privacy: A research survey
-
Juels A. RIFD security and privacy: A research survey. IEEE J. Sel. Areas Comm. 24 2 (2006) 381-394
-
(2006)
IEEE J. Sel. Areas Comm.
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
42
-
-
58649084878
-
-
G. Avoine, Bibliography on security and privacy in rfid systems, online at http://lasecwww.epfl.ch/gavoine/rfid/
-
G. Avoine, Bibliography on security and privacy in rfid systems, online at http://lasecwww.epfl.ch/gavoine/rfid/
-
-
-
-
43
-
-
19944389712
-
Consumer perceptions of privacy, security and trust in ubiquitous commerce
-
Roussos G., and Moussouri T. Consumer perceptions of privacy, security and trust in ubiquitous commerce. Pers. Ubiq. Comp. 8 6 (2004) 416-429
-
(2004)
Pers. Ubiq. Comp.
, vol.8
, Issue.6
, pp. 416-429
-
-
Roussos, G.1
Moussouri, T.2
-
44
-
-
25444432074
-
rfid and the perception of control: The consumer's view
-
Günther O., and Spiekermann S. rfid and the perception of control: The consumer's view. Comm. ACM 48 9 (2005) 73-76
-
(2005)
Comm. ACM
, vol.48
, Issue.9
, pp. 73-76
-
-
Günther, O.1
Spiekermann, S.2
-
45
-
-
58649124562
-
-
H. Dunne, Message development, Auto-ID Sponsor briefing (June 2002)
-
H. Dunne, Message development, Auto-ID Sponsor briefing (June 2002)
-
-
-
-
46
-
-
44249114234
-
Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting
-
Camp J., and Lewis S. (Eds), Kluwer Academic Publishers
-
Acquisti A., and Grossklags J. Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting. In: Camp J., and Lewis S. (Eds). The Economics of Information Security (2004), Kluwer Academic Publishers
-
(2004)
The Economics of Information Security
-
-
Acquisti, A.1
Grossklags, J.2
-
47
-
-
39749120725
-
Ubiquitous computing, customer tracking, and price discrimination
-
Roussos G. (Ed), Springer, London
-
Acquisti A. Ubiquitous computing, customer tracking, and price discrimination. In: Roussos G. (Ed). Ubiquitous and Pervasive Commerce (2006), Springer, London 115-132
-
(2006)
Ubiquitous and Pervasive Commerce
, pp. 115-132
-
-
Acquisti, A.1
-
48
-
-
58649099247
-
-
A.E. Fano, Mobile valet: Enabling collaboration between remote services, mobile users, and task location, in: Proc. 2001 AAAI Fall Symp. Int. Inf., 2001
-
A.E. Fano, Mobile valet: Enabling collaboration between remote services, mobile users, and task location, in: Proc. 2001 AAAI Fall Symp. Int. Inf., 2001
-
-
-
-
49
-
-
58649099458
-
-
A. Gershman, A.E. Fano, Customer service with eyes, in: Proc. Work. Ubiq. Comm. (electronic proceedings, 2003)
-
A. Gershman, A.E. Fano, Customer service with eyes, in: Proc. Work. Ubiq. Comm. (electronic proceedings, 2003)
-
-
-
-
50
-
-
58649094016
-
-
R. Ghani, A.E. Fano, Building recommender systems using a knowledge base of product semantics, in: Proc. Work. Recomm. Pers. E-Comm. 2002
-
R. Ghani, A.E. Fano, Building recommender systems using a knowledge base of product semantics, in: Proc. Work. Recomm. Pers. E-Comm. 2002
-
-
-
-
51
-
-
3042538249
-
Mapping and localization with rfid technology
-
IEEE Press
-
Haehnel D., Burgard W., Fox D., Fishkin K.P., and Philipose M. Mapping and localization with rfid technology. Proc. ICRA 2004 (2004), IEEE Press 1015-1020
-
(2004)
Proc. ICRA 2004
, pp. 1015-1020
-
-
Haehnel, D.1
Burgard, W.2
Fox, D.3
Fishkin, K.P.4
Philipose, M.5
-
52
-
-
58649087654
-
-
D. Wan, Magic medicine cabinet: A situated portal for healthcare, in: Proc. UBICOM 99, 1999
-
D. Wan, Magic medicine cabinet: A situated portal for healthcare, in: Proc. UBICOM 99, 1999
-
-
-
-
53
-
-
58649113912
-
-
D. Wan, Magic wardrobe: Situated shopping from your own bedroom, in: Proc. UBICOM 2000, 2000
-
D. Wan, Magic wardrobe: Situated shopping from your own bedroom, in: Proc. UBICOM 2000, 2000
-
-
-
-
54
-
-
33748529167
-
rfid information grid for blind navigation and wayfinding
-
IEEE Press
-
Willis S., and Helal S. rfid information grid for blind navigation and wayfinding. Proc. ISWC05 (2005), IEEE Press 34-37
-
(2005)
Proc. ISWC05
, pp. 34-37
-
-
Willis, S.1
Helal, S.2
-
55
-
-
33750709967
-
Hands-on rfid: Wireless wearables for detecting use of objects
-
IEEE Press
-
Fishkin K.P., Philipose M., and Rea A. Hands-on rfid: Wireless wearables for detecting use of objects. Proc. ISWC'05 (2005), IEEE Press 38-43
-
(2005)
Proc. ISWC'05
, pp. 38-43
-
-
Fishkin, K.P.1
Philipose, M.2
Rea, A.3
-
56
-
-
84986161478
-
Reaching the consumer through e-grocery VMI
-
Smaros J., and Holmstrom J. Reaching the consumer through e-grocery VMI. Int. J. Retail Distr. Man. 28 2 (2000) 55-61
-
(2000)
Int. J. Retail Distr. Man.
, vol.28
, Issue.2
, pp. 55-61
-
-
Smaros, J.1
Holmstrom, J.2
-
57
-
-
2942556410
-
Radio-frequency identification: Security risks and challenges
-
Sarma S.E., Weis S.A., and Engels D.W. Radio-frequency identification: Security risks and challenges. Cryptobytes 6 1 (2003) 2-9
-
(2003)
Cryptobytes
, vol.6
, Issue.1
, pp. 2-9
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
58
-
-
58649112860
-
-
S. Inoue, H. Yasuura, rfid privacy using user-controllable uniqueness, in: Proc. rfid Priv. Work., 2003
-
S. Inoue, H. Yasuura, rfid privacy using user-controllable uniqueness, in: Proc. rfid Priv. Work., 2003
-
-
-
-
59
-
-
23944476196
-
Minimalist cryptography for low-cost rfid tags
-
Proc. SCN 2004
-
Juels A. Minimalist cryptography for low-cost rfid tags. Proc. SCN 2004. Lecture Notes in Computer Science vol. 3352 (2004) 149-164
-
(2004)
Lecture Notes in Computer Science
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
60
-
-
58649113473
-
-
M. Ohkubo, K. Suzuki, S. Kinoshita, Cryptographic approach to "privacy-friendly" tags, in: Proc. rfid Priv. Work. (electronic proceedings, 2003)
-
M. Ohkubo, K. Suzuki, S. Kinoshita, Cryptographic approach to "privacy-friendly" tags, in: Proc. rfid Priv. Work. (electronic proceedings, 2003)
-
-
-
-
61
-
-
34547623904
-
-
L. Bolotnyy, G. Robins, Physically unclonable function-based security and privacy in rfid systems, in: Proc. IEEE Percom, New York, 2007, pp.211-220
-
L. Bolotnyy, G. Robins, Physically unclonable function-based security and privacy in rfid systems, in: Proc. IEEE Percom, New York, 2007, pp.211-220
-
-
-
-
62
-
-
33749011985
-
Disabling rfid tags with visible confirmation: Clipped tags are silenced
-
ACM Press
-
Karjoth G., and Moskowitz P. Disabling rfid tags with visible confirmation: Clipped tags are silenced. Proc. Work. Priv. Elec. Soc. (2005), ACM Press 27-30
-
(2005)
Proc. Work. Priv. Elec. Soc.
, pp. 27-30
-
-
Karjoth, G.1
Moskowitz, P.2
-
63
-
-
34247160993
-
Enabling rfid in retail
-
Roussos G. Enabling rfid in retail. IEEE Computer. 39 3 (2006) 25-30
-
(2006)
IEEE Computer.
, vol.39
, Issue.3
, pp. 25-30
-
-
Roussos, G.1
-
64
-
-
58649093799
-
rfid in ubiquitious commerce
-
Roussos G. (Ed), Springer, London
-
Garfinkel S. rfid in ubiquitious commerce. In: Roussos G. (Ed). Ubiquitous and Pervasive Commerce (2005), Springer, London
-
(2005)
Ubiquitous and Pervasive Commerce
-
-
Garfinkel, S.1
-
65
-
-
58649087441
-
Hacking the prox card
-
Garfinkel S., and Rosenberg B. (Eds), Addison-Wesley
-
Westhues J. Hacking the prox card. In: Garfinkel S., and Rosenberg B. (Eds). rfid: Perspectives, Policy, and Practice (2005), Addison-Wesley
-
(2005)
rfid: Perspectives, Policy, and Practice
-
-
Westhues, J.1
-
67
-
-
26444478592
-
rfid traceability: A multilayer problem
-
Proc. Financial Cryptography, Springer, Berlin
-
Avoine G., and Oechslin P. rfid traceability: A multilayer problem. Proc. Financial Cryptography. Lecture Notes in Computer Science vol. 3570 (2005), Springer, Berlin 125-140
-
(2005)
Lecture Notes in Computer Science
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
68
-
-
84877887414
-
Security analysis of a cryptographically-enabled rfid device
-
USENIX Press
-
Bono S., Green M., Stubblefield A., Juels A., Rubin A., and Szydlo M. Security analysis of a cryptographically-enabled rfid device. Proc. 14th USENIX Security Symp. (2005), USENIX Press 1-16
-
(2005)
Proc. 14th USENIX Security Symp.
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
69
-
-
58649092226
-
A practical relay attack on ISO 14443 proximity cards
-
IEEE Press
-
Hancke G.P. A practical relay attack on ISO 14443 proximity cards. Proc. ISSP 2005 (2005), IEEE Press 328-333
-
(2005)
Proc. ISSP 2005
, pp. 328-333
-
-
Hancke, G.P.1
-
70
-
-
23944477452
-
Some methods for privacy in rfid communication
-
Proc. WSASN04
-
Fishkin K.P., Roy S., and Jiang B. Some methods for privacy in rfid communication. Proc. WSASN04. Lecture Notes in Computer Science vol. 3313 (2004) 42-53
-
(2004)
Lecture Notes in Computer Science
, vol.3313
, pp. 42-53
-
-
Fishkin, K.P.1
Roy, S.2
Jiang, B.3
-
71
-
-
33847329743
-
An rfid distance bounding protocol
-
IEEE Press
-
Hancke G.P., and Kuhn M.G. An rfid distance bounding protocol. Proc. SECURECOMM 2005 (2005), IEEE Press 67-73
-
(2005)
Proc. SECURECOMM 2005
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
72
-
-
58649106059
-
-
D. Carluccio, K. Lemke, C. Paar, Electromagnetic side channel analysis of a contactless smart card: First results, in: Proc. Ecrypt Workshop on rfid and Lightweight Crypto (electronic proceedings, 2005)
-
D. Carluccio, K. Lemke, C. Paar, Electromagnetic side channel analysis of a contactless smart card: First results, in: Proc. Ecrypt Workshop on rfid and Lightweight Crypto (electronic proceedings, 2005)
-
-
-
-
73
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
Proc. SPW97, Springer, Berlin
-
Anderson R.J., and Kuhn M.G. Low cost attacks on tamper resistant devices. Proc. SPW97. Lecture Notes in Computer Science vol. 1361 (1997), Springer, Berlin 125-136
-
(1997)
Lecture Notes in Computer Science
, vol.1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
74
-
-
58649123182
-
-
D.R. Thompson, N. Chaudhry, C.W. Thompson, rfid security threat model, in: Proc. ALAR05 (electronic proceedings, 2006)
-
D.R. Thompson, N. Chaudhry, C.W. Thompson, rfid security threat model, in: Proc. ALAR05 (electronic proceedings, 2006)
-
-
-
-
75
-
-
33747304628
-
Is your cat infected with a computer virus?
-
IEEE CS Press
-
Rieback M., Crispo B., and Tanenbaum A. Is your cat infected with a computer virus?. Proc. PERCOM 2006 (2006), IEEE CS Press 169-179
-
(2006)
Proc. PERCOM 2006
, pp. 169-179
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
76
-
-
32844459514
-
Self-powered wireless temperature sensors exploit rfid technology
-
Opasjumruskit K., Thanthipwan T., Sathusen O., Sirinamarattana P., Gadmanee P., Pootarapan E., Wongkomet N., Thanachayanont A., and Thamsirianunt M. Self-powered wireless temperature sensors exploit rfid technology. IEEE Perv. Comp. 5 1 (2006) 54-61
-
(2006)
IEEE Perv. Comp.
, vol.5
, Issue.1
, pp. 54-61
-
-
Opasjumruskit, K.1
Thanthipwan, T.2
Sathusen, O.3
Sirinamarattana, P.4
Gadmanee, P.5
Pootarapan, E.6
Wongkomet, N.7
Thanachayanont, A.8
Thamsirianunt, M.9
-
77
-
-
34250340562
-
Pervasive pheromone-based interactions with rfid tags
-
Article 4
-
Mamei M., and Zambonelli F. Pervasive pheromone-based interactions with rfid tags. ACM Trans. Aut. Adap. Sys. 2 2 (2007) Article 4
-
(2007)
ACM Trans. Aut. Adap. Sys.
, vol.2
, Issue.2
-
-
Mamei, M.1
Zambonelli, F.2
-
79
-
-
58649087857
-
-
D. Simner, Networks using MIFARE cards as the transport medium, Computer Science Tripos Part II, Jesus College, University of Cambridge
-
D. Simner, Networks using MIFARE cards as the transport medium, Computer Science Tripos Part II, Jesus College, University of Cambridge
-
-
-
-
80
-
-
34250667545
-
Architecture design and performance evaluation of RFID object tracking systems
-
Chen J.-L., Chen M.-C., Chen C.-W., and Chang Y.-C. Architecture design and performance evaluation of RFID object tracking systems. Comp. Communications 30 (2007) 2070-2086
-
(2007)
Comp. Communications
, vol.30
, pp. 2070-2086
-
-
Chen, J.-L.1
Chen, M.-C.2
Chen, C.-W.3
Chang, Y.-C.4
-
81
-
-
51949113092
-
-
M. Bessho, S. Kobayashi, N. Koshizuka, K. Sakamura, A space-identifying ubiquitous infrastructure and its application for tour-guiding service, in: Proc. ACM SAC 2008, 2008
-
M. Bessho, S. Kobayashi, N. Koshizuka, K. Sakamura, A space-identifying ubiquitous infrastructure and its application for tour-guiding service, in: Proc. ACM SAC 2008, 2008
-
-
-
-
82
-
-
34547239439
-
-
C. Alippi, D. Cogliati, G. Vanini, A statistical approach to localize passive RFIDs, in: Proc. ICAS 2006, 2006, pp. 843-846
-
C. Alippi, D. Cogliati, G. Vanini, A statistical approach to localize passive RFIDs, in: Proc. ICAS 2006, 2006, pp. 843-846
-
-
-
-
83
-
-
40949110054
-
Bluebot: Asset tracking via robotic location crawling
-
Patil A., Munson J., Wood D., and Cole A. Bluebot: Asset tracking via robotic location crawling. Comp. Comms. 31 6 (2008) 1067-1077
-
(2008)
Comp. Comms.
, vol.31
, Issue.6
, pp. 1067-1077
-
-
Patil, A.1
Munson, J.2
Wood, D.3
Cole, A.4
-
84
-
-
3042785155
-
Developing consumer-friendly pervasive retail systems
-
Kourouthanassis P., and Roussos G. Developing consumer-friendly pervasive retail systems. IEEE Perv. Comp. 2 2 (2003) 32-39
-
(2003)
IEEE Perv. Comp.
, vol.2
, Issue.2
, pp. 32-39
-
-
Kourouthanassis, P.1
Roussos, G.2
-
85
-
-
84900558744
-
The periscope: Supporting a computer enhanced field trip for children
-
Wilde D., Harris E., Rogers Y., and Randell C. The periscope: Supporting a computer enhanced field trip for children. Pers. Ubiq. Comput. 7 (2003) 227-233
-
(2003)
Pers. Ubiq. Comput.
, vol.7
, pp. 227-233
-
-
Wilde, D.1
Harris, E.2
Rogers, Y.3
Randell, C.4
-
86
-
-
57549106443
-
Towards guidelines for designing augmented toy environments
-
van der Schijff J., Marsden G., and Kotze P. (Eds), ACM Press, New York
-
Hinske S., Langheinrich M., and Lampe M. Towards guidelines for designing augmented toy environments. In: van der Schijff J., Marsden G., and Kotze P. (Eds). Proc. 6th ACM Conference on Designing Interactive Systems (DIS 2008) (2008), ACM Press, New York
-
(2008)
Proc. 6th ACM Conference on Designing Interactive Systems (DIS 2008)
-
-
Hinske, S.1
Langheinrich, M.2
Lampe, M.3
-
88
-
-
85146199905
-
-
S.R. Jeffery, M. Garofalakis, M.J. Franklin, Adaptive cleaning for rfid data streams, in: Proc. VLDB05, 2005, pp.163-174
-
S.R. Jeffery, M. Garofalakis, M.J. Franklin, Adaptive cleaning for rfid data streams, in: Proc. VLDB05, 2005, pp.163-174
-
-
-
-
89
-
-
34250735599
-
-
E. Wu, Y. Diao, S. Rizvi, High-performance complex event processing over streams, in: ACM SIGMOD, 2006, pp. 407-418
-
E. Wu, Y. Diao, S. Rizvi, High-performance complex event processing over streams, in: ACM SIGMOD, 2006, pp. 407-418
-
-
-
-
90
-
-
13244267070
-
An ubiquitous architectural framework and protocol for object tracking using rfid tags
-
ACM Press
-
De P., Basu K., and Das S.K. An ubiquitous architectural framework and protocol for object tracking using rfid tags. Proc. MobiQuitous (2004), ACM Press 174-182
-
(2004)
Proc. MobiQuitous
, pp. 174-182
-
-
De, P.1
Basu, K.2
Das, S.K.3
-
91
-
-
58649097339
-
Usability evaluation of queryLens: Implications for context-aware information sharing using rfid
-
Acta Press
-
Nam C.S., and Konomi S. Usability evaluation of queryLens: Implications for context-aware information sharing using rfid. Proc. IASTED-HCI 2005 (2005), Acta Press 90-95
-
(2005)
Proc. IASTED-HCI 2005
, pp. 90-95
-
-
Nam, C.S.1
Konomi, S.2
-
92
-
-
58649090303
-
-
A.K. Dey, G.D. Abowd, D. Salber, A context-based infrastructure for smart environments, in: Proc. MANSE99, 1999, pp. 114-128
-
A.K. Dey, G.D. Abowd, D. Salber, A context-based infrastructure for smart environments, in: Proc. MANSE99, 1999, pp. 114-128
-
-
-
-
93
-
-
0034506406
-
Context-aware design and interaction in computer systems
-
Selker T., and Burleson W. Context-aware design and interaction in computer systems. IBM Sys. J. 39 3-4 (2000) 880-891
-
(2000)
IBM Sys. J.
, vol.39
, Issue.3-4
, pp. 880-891
-
-
Selker, T.1
Burleson, W.2
-
95
-
-
2442449499
-
Applications of context-aware computing in hospital work examples and design principles
-
ACM Press
-
Bardram J.E. Applications of context-aware computing in hospital work examples and design principles. Proc. ACM SAC 2004 (2004), ACM Press 1574-1579
-
(2004)
Proc. ACM SAC 2004
, pp. 1574-1579
-
-
Bardram, J.E.1
-
96
-
-
24944462927
-
Aware mirror: A personalized display using a mirror
-
Proc. Pervasive2005, Springer, Berlin
-
Fujinami K., Kawsar F., and Nakajima T. Aware mirror: A personalized display using a mirror. Proc. Pervasive2005. Lecture Notes in Computer Science vol. 3468 (2005), Springer, Berlin 315-332
-
(2005)
Lecture Notes in Computer Science
, vol.3468
, pp. 315-332
-
-
Fujinami, K.1
Kawsar, F.2
Nakajima, T.3
-
97
-
-
33845646230
-
From informing to remembering: Deploying a ubiquitous system in an interactive science museum
-
Fleck M., Frid M., Kindberg T., O'Brian-Strain E., Rajani R., and Spasojevic M. From informing to remembering: Deploying a ubiquitous system in an interactive science museum. IEEE Perv. Comp. 1 2 (2002) 13-21
-
(2002)
IEEE Perv. Comp.
, vol.1
, Issue.2
, pp. 13-21
-
-
Fleck, M.1
Frid, M.2
Kindberg, T.3
O'Brian-Strain, E.4
Rajani, R.5
Spasojevic, M.6
-
98
-
-
85084771755
-
A tangible interface for organizing information using a grid
-
ACM Press
-
Jacob R.J.K., Ishii H., Pangaro G., and Patten J. A tangible interface for organizing information using a grid. Proc. CHI 2002 (2001), ACM Press 339-346
-
(2001)
Proc. CHI 2002
, pp. 339-346
-
-
Jacob, R.J.K.1
Ishii, H.2
Pangaro, G.3
Patten, J.4
-
99
-
-
21644443329
-
Augmenting the social space of an academic conference
-
ACM Press
-
McCarthy J.F., McDonald D.W., Soroczak S., Nguyen D.H., and Rashid A.M. Augmenting the social space of an academic conference. Proc. CSCW 04 (2004), ACM Press 39-48
-
(2004)
Proc. CSCW 04
, pp. 39-48
-
-
McCarthy, J.F.1
McDonald, D.W.2
Soroczak, S.3
Nguyen, D.H.4
Rashid, A.M.5
-
100
-
-
33745726227
-
An rfid-based multi-service system for supporting conference events
-
IEEE Press
-
Watanabe T., Inoue S., Yasuura H., Sasaki J., Aoki Y., and Akimoto K. An rfid-based multi-service system for supporting conference events. Proc. AMT 05 (2005), IEEE Press 435-439
-
(2005)
Proc. AMT 05
, pp. 435-439
-
-
Watanabe, T.1
Inoue, S.2
Yasuura, H.3
Sasaki, J.4
Aoki, Y.5
Akimoto, K.6
-
101
-
-
33748122344
-
Supporting colocated interactions using rfid and social network displays
-
Konomi S., Inoue S., Kobayashi T., Tsuchida M., and Kitsuregawa M. Supporting colocated interactions using rfid and social network displays. IEEE Perv. Comp. 5 3 (2006) 48-56
-
(2006)
IEEE Perv. Comp.
, vol.5
, Issue.3
, pp. 48-56
-
-
Konomi, S.1
Inoue, S.2
Kobayashi, T.3
Tsuchida, M.4
Kitsuregawa, M.5
-
102
-
-
26444442422
-
Scanning with a purpose-Supporting the fair information principles in rfid protocols
-
Proc. UCS 2004, Springer, Berlin
-
Floerkemeier C., Schneider R., and Langheinrich M. Scanning with a purpose-Supporting the fair information principles in rfid protocols. Proc. UCS 2004. Lecture Notes in Computer Science vol. 3598 (2005), Springer, Berlin 214-231
-
(2005)
Lecture Notes in Computer Science
, vol.3598
, pp. 214-231
-
-
Floerkemeier, C.1
Schneider, R.2
Langheinrich, M.3
-
103
-
-
58649119119
-
-
A. Juels, P. Syverson, D. Bailey, High-power proxies for enhancing rfid privacy and utility, in: Proc. Work. Priv. Enh. Tech. (electronic proceedings, 2005)
-
A. Juels, P. Syverson, D. Bailey, High-power proxies for enhancing rfid privacy and utility, in: Proc. Work. Priv. Enh. Tech. (electronic proceedings, 2005)
-
-
-
-
104
-
-
18744409344
-
The blocker tag: Selective blocking of rfid tags for consumer privacy
-
ACM Press
-
Juels A., Rivest R.L., and Szydlo M. The blocker tag: Selective blocking of rfid tags for consumer privacy. Proc. ACM CCS03 (2003), ACM Press 103-111
-
(2003)
Proc. ACM CCS03
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
105
-
-
38049173955
-
E-Passport: The global traceability or how to feel like an UPS package
-
Proc. WISA 2007, Springer, Berlin
-
Carluccio D., Lemke-Rust K., Paar C., and Sadeghi A.-R. E-Passport: The global traceability or how to feel like an UPS package. Proc. WISA 2007. Lecture Notes in Computer Science vol. 4298 (2007), Springer, Berlin
-
(2007)
Lecture Notes in Computer Science
, vol.4298
-
-
Carluccio, D.1
Lemke-Rust, K.2
Paar, C.3
Sadeghi, A.-R.4
-
106
-
-
0042377377
-
The future of business services
-
Fano A.E., and Gershman A. The future of business services. Comm. ACM 35 12 (2002) 83-87
-
(2002)
Comm. ACM
, vol.35
, Issue.12
, pp. 83-87
-
-
Fano, A.E.1
Gershman, A.2
-
107
-
-
4544318813
-
The sensor spectrum: Technology, trends, and requirements
-
Hellerstein J.M., Hong W., and Madden S.R. The sensor spectrum: Technology, trends, and requirements. ACM SIGMOD Rec. 32 4 (2003) 22-27
-
(2003)
ACM SIGMOD Rec.
, vol.32
, Issue.4
, pp. 22-27
-
-
Hellerstein, J.M.1
Hong, W.2
Madden, S.R.3
|