-
1
-
-
70349286554
-
A capacitive touch interface for passive RFID tags
-
A. P. Sample, D. J. Yeager, and J. R. Smith, "A capacitive touch interface for passive RFID tags," in IEEE RFID, 2009.
-
(2009)
IEEE RFID
-
-
Sample, A.P.1
Yeager, D.J.2
Smith, J.R.3
-
2
-
-
78650080956
-
Still and silent: Motion detection for enhanced RFID security and privacy without changing the usage model
-
N. Saxena and J. Voris, "Still and silent: motion detection for enhanced RFID security and privacy without changing the usage model," Radio Frequency Identification: Security and Privacy Issues, pp. 2-21, 2010.
-
(2010)
Radio Frequency Identification: Security and Privacy Issues
, pp. 2-21
-
-
Saxena, N.1
Voris, J.2
-
3
-
-
84877668527
-
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems
-
December
-
D. Ma and N. Saxena, "A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems," Security and Communication Networks, December 2011.
-
(2011)
Security and Communication Networks
-
-
Ma, D.1
Saxena, N.2
-
4
-
-
70349301622
-
RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
-
A. Czeskis, K. Koscher, J. R. Smith, and T. Kohno, "RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications," in ACM CCS, 2008.
-
(2008)
ACM CCS
-
-
Czeskis, A.1
Koscher, K.2
Smith, J.R.3
Kohno, T.4
-
5
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels, "RFID security and privacy: A research survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
6
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
R. Mayrhofer and H. Gellersen, "Shake well before use: Authentication based on accelerometer data," Pervasive Computing, pp. 144-161, 2007.
-
(2007)
Pervasive Computing
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
7
-
-
76849106311
-
Universally composable RFID identification and authentication protocols
-
M. Burmester, T. Van Le, B. De Medeiros, and G. Tsudik, "Universally composable RFID identification and authentication protocols," ACM Transactions on Info. and System Security, vol. 12, no. 4, p. 21, 2009.
-
(2009)
ACM Transactions on Info. and System Security
, vol.12
, Issue.4
, pp. 21
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
Tsudik, G.4
-
8
-
-
54949090328
-
Design of an RFID-based battery-free programmable sensing platform
-
A. P. Sample, D. J. Yeager, P. S. Powledge, A. V. Mamishev, and J. R. Smith, "Design of an RFID-based battery-free programmable sensing platform," IEEE Trans. Instrum. Meas., 2008.
-
(2008)
IEEE Trans. Instrum. Meas.
-
-
Sample, A.P.1
Yeager, D.J.2
Powledge, P.S.3
Mamishev, A.V.4
Smith, J.R.5
-
9
-
-
83455228782
-
Demo: WISP-based access control combining electronic and mechanical authentication
-
Y. Shu, J. Chen, F. Jiang, Y. Gu, Z. Dai, and T. He, "Demo: WISP-based access control combining electronic and mechanical authentication," in ACM SenSys, 2011.
-
(2011)
ACM SenSys
-
-
Shu, Y.1
Chen, J.2
Jiang, F.3
Gu, Y.4
Dai, Z.5
He, T.6
-
10
-
-
60149096491
-
An empirical study of UHF RFID performance
-
M. Buettner and D. Wetherall, "An empirical study of UHF RFID performance," in ACM MobiCom, 2008.
-
(2008)
ACM MobiCom
-
-
Buettner, M.1
Wetherall, D.2
-
11
-
-
70349757643
-
An RFID based system for monitoring free weight exercises
-
Acm
-
R. Chaudhri, J. Lester, G. Borriello, and Acm, "An RFID based system for monitoring free weight exercises," in ACM Sensys, 2008.
-
(2008)
ACM Sensys
-
-
Chaudhri, R.1
Lester, J.2
Borriello, G.3
-
12
-
-
77954968837
-
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
-
J. Gummeson, S. S. Clark, K. Fu, and D. Ganesan, "On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors," in ACM MobiSys, 2010.
-
(2010)
ACM MobiSys
-
-
Gummeson, J.1
Clark, S.S.2
Fu, K.3
Ganesan, D.4
-
13
-
-
33847376449
-
Energy scavenging for inductively coupled passive RFID systems
-
B. Jiang, J. R. Smith, M. Philipose, S. Roy, K. Sundara-Rajan, and A. V. Mamishev, "Energy scavenging for inductively coupled passive RFID systems," IEEE Trans. Instrum. Meas., 2007.
-
(2007)
IEEE Trans. Instrum. Meas.
-
-
Jiang, B.1
Smith, J.R.2
Philipose, M.3
Roy, S.4
Sundara-Rajan, K.5
Mamishev, A.V.6
-
14
-
-
46349102722
-
RFID MAC performance evaluation based on ISO/IEC 18000-6 type C
-
Y. Ko, S. Roy, J. R. Smith, H. Lee, and C. Cho, "RFID MAC performance evaluation based on ISO/IEC 18000-6 type C," IEEE Communications Letters, 2008.
-
(2008)
IEEE Communications Letters
-
-
Ko, Y.1
Roy, S.2
Smith, J.R.3
Lee, H.4
Cho, C.5
-
15
-
-
84877678886
-
Gesture recognition model based on 3D accelerations
-
J. Kong, H. Wang, and G. Zhang, "Gesture recognition model based on 3D accelerations," in IEEE ICCSE, 2009.
-
(2009)
IEEE ICCSE
-
-
Kong, J.1
Wang, H.2
Zhang, G.3
-
17
-
-
49049103638
-
Wirelessly-charged UHF tags for sensor data collection
-
D. J. Yeager, P. S. Powledge, R. Prasad, D. Wetherall, and J. R. Smith, "Wirelessly-charged UHF tags for sensor data collection," in IEEE RFID, 2008.
-
(2008)
IEEE RFID
-
-
Yeager, D.J.1
Powledge, P.S.2
Prasad, R.3
Wetherall, D.4
Smith, J.R.5
-
18
-
-
84877671985
-
Gesture recognition for interactive controllers using MEMS motion sensors
-
S. Zhou, Q. Shan, F. Fei, W. J. Li, C. P. Kwong, P. C. K. Wu, B. Meng, C. K. H. Chan, and J. Y. J. Liou, "Gesture recognition for interactive controllers using MEMS motion sensors," in IEEE NEMS, 2009.
-
(2009)
IEEE NEMS
-
-
Zhou, S.1
Shan, Q.2
Fei, F.3
Li, W.J.4
Kwong, C.P.5
Wu, P.C.K.6
Meng, B.7
Chan, C.K.H.8
Liou, J.Y.J.9
|