메뉴 건너뛰기




Volumn , Issue , 2009, Pages 16-18

Experimental results with two wireless power transfer systems

Author keywords

RF power harvesting; Sensing; UHF RFID; Wireless power transfer

Indexed keywords

COMMERCIAL OFF THE SHELVES; RF POWER HARVESTING; RFID READERS; SENSING; SENSOR DEVICE; TRANSMIT POWER; TV TOWER; UHF ENERGY; UHF RFID; WIRELESS IDENTIFICATION AND SENSING PLATFORMS; WIRELESS POWER TRANSFER;

EID: 67650565108     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RWS.2009.4957273     Document Type: Conference Paper
Times cited : (208)

References (8)
  • 2
    • 85052569451 scopus 로고    scopus 로고
    • WISP: A passively powered UHF RFID tag with sensing and computation
    • S.A. Ahson, M. Ilyas (Eds) RFID Handbook: CRC Press, Boca Raton, FL.
    • D.J. Yeager, A.P. Sample, J.R. Smith, "WISP: A Passively Powered UHF RFID Tag with Sensing and Computation," in S.A. Ahson, M. Ilyas (Eds) RFID Handbook: Applications, Technology, Security, and Privacy. CRC Press, Boca Raton, FL. pp. 261-278.
    • Applications, Technology, Security, and Privacy , pp. 261-278
    • Yeager, D.J.1    Sample, A.P.2    Smith, J.R.3
  • 6
    • 50249176295 scopus 로고    scopus 로고
    • Maximalist cryptography and computation on the WISP UHF RFID tag
    • July
    • H.J. Chae, D.J. Yeager, J.R. Smith, K. Fu, "Maximalist Cryptography and Computation on the WISP UHF RFID Tag," Conference on RFID Security, July 2007. http://www.rfidsec07.etsit.uma.es/slides/papers/paper- 31.pdf
    • (2007) Conference on RFID Security
    • Chae, H.J.1    Yeager, D.J.2    Smith, J.R.3    Fu, K.4
  • 7
    • 70349301622 scopus 로고    scopus 로고
    • RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
    • October 27-31
    • A. Czeskis, K. Koscher, J.R. Smith, T. Kohno, "RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications" 15th ACM Conference on Computer and Communications Security, October 27-31, 2008.
    • (2008) 15th ACM Conference on Computer and Communications Security
    • Czeskis, A.1    Koscher, K.2    Smith, J.R.3    Kohno, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.