-
2
-
-
34250788516
-
A magnetometer-based approach for studying human movements
-
Jul
-
S. Bonnet and R. Heliot, "A magnetometer-based approach for studying human movements," IEEE Tran. on Biomedical Engineering, vol. 54, no. 7, Jul. 2007.
-
(2007)
IEEE Tran. on Biomedical Engineering
, vol.54
, Issue.7
-
-
Bonnet, S.1
Heliot, R.2
-
4
-
-
70450164056
-
Recognizing daily activities with RFID-based sensors
-
M. Buettner, R. Prasad, M. Philipose, and D. Wetherall, "Recognizing Daily Activities with RFID-Based Sensors," in International Conference on Ubiquitous Computing (Ubi-Comp), 2009.
-
(2009)
International Conference on Ubiquitous Computing (Ubi-Comp)
-
-
Buettner, M.1
Prasad, R.2
Philipose, M.3
Wetherall, D.4
-
5
-
-
70349301622
-
RFIDs and secret handshakes: Defending against Ghost-and-Leech attacks and unauthorized reads with context-aware communications
-
A. Czeskis, K. Koscher, J. Smith, and T. Kohno, "RFIDs and secret handshakes: Defending against Ghost-and-Leech attacks and unauthorized reads with context-aware communications," in ACM Conference on Computer and Communications Security, 2008.
-
(2008)
ACM Conference on Computer and Communications Security
-
-
Czeskis, A.1
Koscher, K.2
Smith, J.3
Kohno, T.4
-
6
-
-
85066944987
-
Keep your enemies close:Distance bounding against smartcard relay attacks
-
August
-
S. Drimer and S. J. Murdoch, "Keep your enemies close:Distance bounding against smartcard relay attacks," in 16th USENIX Security Symposium, August 2007.
-
(2007)
16th USENIX Security Symposium
-
-
Drimer, S.1
Murdoch, S.J.2
-
9
-
-
0037389292
-
Is it feasible to reconstruct body segment 3-d position and orientation using accelerometric data
-
D. Giansanti, V. Macellari, and G. Maccioni, "Is it feasible to reconstruct body segment 3-d position and orientation using accelerometric data," IEEE Trans. Biomed. Eng, vol. 50, p. 2003, 2003.
-
(2003)
IEEE Trans. Biomed. Eng
, vol.50
, pp. 2003
-
-
Giansanti, D.1
MacEllari, V.2
MacCioni, G.3
-
11
-
-
70349287159
-
Vulnerabilities in first-generation RFID-enabled credit cards
-
T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. O'Hare, "Vulnerabilities in first-generation RFID-enabled credit cards," in Financial Cryptography, 2007.
-
(2007)
Financial Cryptography
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'hare, T.5
-
12
-
-
63649112419
-
NeuralWISP: An energy-harvesting wireless neural interface with 1-m range
-
J. Holleman, D. Yeager, R. Prasad, J. Smith, and B. Otis, "NeuralWISP: An energy-harvesting wireless neural interface with 1-m range," in Biomedical Circuits and Systems Conference (BioCAS), 2008.
-
(2008)
Biomedical Circuits and Systems Conference (BioCAS)
-
-
Holleman, J.1
Yeager, D.2
Prasad, R.3
Smith, J.4
Otis, B.5
-
13
-
-
84861612324
-
-
Honeywell, "HMC1053 3-axis magnetic sensor," Available online at http://www.honeywellsensor. com.cn/prodinfo/sensor magnetic/datasheet/ HMC1053.pdf.
-
HMC1053 3-axis Magnetic Sensor
-
-
Honeywell1
-
14
-
-
79951662076
-
Monitoring body positions and movements during sleep using WISPs
-
E. Hoque, R. F. Dickerson, and J. A. Stankovic, "Monitoring body positions and movements during sleep using WISPs," in Wireless Health, 2010.
-
(2010)
Wireless Health
-
-
Hoque, E.1
Dickerson, R.F.2
Stankovic, J.A.3
-
15
-
-
65249152452
-
3D orientation tracking based on unscented Kalman filtering of accelerometer and magnetometer data
-
Feb
-
B. Huyghe and J. Doutreloigne, "3D orientation tracking based on unscented Kalman filtering of accelerometer and magnetometer data," in IEEE Sensors Application Symposium, Feb 2009.
-
(2009)
IEEE Sensors Application Symposium
-
-
Huyghe, B.1
Doutreloigne, J.2
-
16
-
-
33144457479
-
RFID security and privacy: A research survey
-
February
-
A. Juels, "RFID security and privacy: A research survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
22
-
-
74049091231
-
EPC RFID tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond
-
K. Koscher, A. Juels, V. Brajkovic, and T. Kohno, "EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond," in ACM Conference on Computer and Communications Security, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
-
-
Koscher, K.1
Juels, A.2
Brajkovic, V.3
Kohno, T.4
-
23
-
-
70449645004
-
UWave: Accelerometer-based personalized gesture recognition and its applications
-
December
-
J. Liu, Z. Wang, L. Zhong, J. Wickramasuriya, and V. Vasudevan, "uWave: Accelerometer-based personalized gesture recognition and its applications," Pervasive and Mobile Computing, vol. 5, no. 6, pp. 657-575, December 2009.
-
(2009)
Pervasive and Mobile Computing
, vol.5
, Issue.6
, pp. 657-575
-
-
Liu, J.1
Wang, Z.2
Zhong, L.3
Wickramasuriya, J.4
Vasudevan, V.5
-
28
-
-
79960857001
-
-
January
-
A. Ruhanen and et. al., "Sensor-enabled RFID tag handbook," http://www.bridgeproject. eu/data/File/BRIDGE WP01 RFID tag handbook.pdf, January 2008.
-
(2008)
Sensor-enabled RFID Tag Handbook
-
-
Ruhanen, A.1
-
29
-
-
84858390549
-
Design of a passively-powered, programmable sensing platform for UHF RFID systems
-
A. Sample, D. Yeager, P. Powledge, and J. Smith, "Design of a passively-powered, programmable sensing platform for UHF RFID systems," in IEEE International Conference on RFID, 2007.
-
(2007)
IEEE International Conference on RFID
-
-
Sample, A.1
Yeager, D.2
Powledge, P.3
Smith, J.4
-
31
-
-
78649255421
-
Directional antenna diversity for mobile devices: Characterizations and solutions
-
Sept
-
A. A. Sani, L. Zhong, and A. Sabharwal, "Directional antenna diversity for mobile devices: characterizations and solutions," in ACM MobiCom, Sept. 2010.
-
(2010)
ACM MobiCom
-
-
Sani, A.A.1
Zhong, L.2
Sabharwal, A.3
-
32
-
-
79957950088
-
Vibrate-to-Unlock: Mobile phone assisted user authentication to multiple personal RFID tags
-
N. Saxena, B. Uddin, J. Voris, and N. Asokan, "Vibrate-to-Unlock: Mobile phone assisted user authentication to multiple personal RFID tags," in Pervasive Computing and Communications (PerCom), 2011.
-
(2011)
Pervasive Computing and Communications (PerCom)
-
-
Saxena, N.1
Uddin, B.2
Voris, J.3
Asokan, N.4
-
33
-
-
84860658281
-
Still and silent: Motion detection for enhanced rfid security and privacy without changing the usage model
-
June
-
N. Saxena and J. Voris, "Still and silent: Motion detection for enhanced rfid security and privacy without changing the usage model," in Workshop on RFID Security (RFIDSec), June 2010.
-
(2010)
Workshop on RFID Security (RFIDSec)
-
-
Saxena, N.1
Voris, J.2
-
34
-
-
85009517134
-
A wirelessly-powered platform for sensing and computation
-
J. R. Smith, P. S. Powledge, S. Roy, and A. Mamishev, "A wirelessly-powered platform for sensing and computation," in 8th International Conference on Ubiquitous Computing (Ubicomp), 2006.
-
(2006)
8th International Conference on Ubiquitous Computing (Ubicomp)
-
-
Smith, J.R.1
Powledge, P.S.2
Roy, S.3
Mamishev, A.4
-
35
-
-
84861629009
-
-
Sparkfun Electronics
-
Sparkfun Electronics, "Low-Power Low-Cost Microphones," Available online at http://www.sparkfun.com/search/results? term= microphonen&what=products.
-
Low-Power Low-Cost Microphones
-
-
-
37
-
-
40649129071
-
A simplified Quaternion-based algorithm for orientation estimation from earth gravity and magnetic field measurements
-
Mar
-
X. Yun, E. R. Bachmann, and R. B. McGhee, "A simplified Quaternion-based algorithm for orientation estimation from earth gravity and magnetic field measurements," IEEE Tran. on Instrumentation and Measurement, vol. 57, no. 3, Mar. 2008.
-
(2008)
IEEE Tran. on Instrumentation and Measurement
, vol.57
, Issue.3
-
-
Yun, X.1
Bachmann, E.R.2
McGhee, R.B.3
|