-
1
-
-
78651394059
-
Towards human motion capturing using gyroscopeless orientation estimation
-
Oct.
-
U. Blanke and B. Schiele, ''Towards human motion capturing using gyroscopeless orientation estimation, '' in Proc. 14th ISWC, Oct. 2010, pp. 20-35.
-
(2010)
Proc. 14th ISWC
, pp. 20-35
-
-
Blanke, U.1
Schiele, B.2
-
2
-
-
34250788516
-
A magnetometer-based approach for studying human movements
-
Jul.
-
S. Bonnet and R. Heliot, ''A magnetometer-based approach for studying human movements, '' IEEE Trans. Biomed. Eng., vol. 54, no. 7, pp. 1353-1355, Jul. 2007.
-
(2007)
IEEE Trans. Biomed. Eng.
, vol.54
, Issue.7
, pp. 1353-1355
-
-
Bonnet, S.1
Heliot, R.2
-
4
-
-
70349301622
-
RFIDs and secret handshakes: Defending against Ghost-and-Leech attacks and unauthorized reads with context-aware communications
-
A. Czeskis, K. Koscher, J. Smith, and T. Kohno, ''RFIDs and secret handshakes: Defending against Ghost-and-Leech attacks and unauthorized reads with context-aware communications, '' in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 479-490.
-
(2008)
Proc. ACM Conf. Comput. Commun. Security
, pp. 479-490
-
-
Czeskis, A.1
Koscher, K.2
Smith, J.3
Kohno, T.4
-
6
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
Aug.
-
S. Drimer and S. J. Murdoch, ''Keep your enemies close: Distance bounding against smartcard relay attacks, '' in Proc. 16th USENIX Security Symp., Aug. 2007, pp. 87-102.
-
(2007)
Proc. 16th USENIX Security Symp.
, pp. 87-102
-
-
Drimer, S.1
Murdoch, S.J.2
-
7
-
-
57649223551
-
A fast algorithm to track changes of direction of a person using magnetometers
-
Jan.
-
A. Fleury, N. Noury, and N. Vuillerme, ''A fast algorithm to track changes of direction of a person using magnetometers, '' in Proc. IEEE Conf. EMBS, Jan. 2007, pp. 2311-2314.
-
(2007)
Proc. IEEE Conf. EMBS
, pp. 2311-2314
-
-
Fleury, A.1
Noury, N.2
Vuillerme, N.3
-
8
-
-
84888171353
-
Relay attacks on passive keyless entry and start systems in modern cars
-
Feb.
-
A. Francillon, B. Danev, and S. Capkun, ''Relay attacks on passive keyless entry and start systems in modern cars, '' in Proc. 18th Annu. NDSS, Feb. 2011, pp. 1-15.
-
(2011)
Proc. 18th Annu. NDSS
, pp. 1-15
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
9
-
-
0037389292
-
Is it feasible to reconstruct body segment 3D position and orientation using accelerometric data
-
Apr.
-
D. Giansanti, V. Macellari, and G. Maccioni, ''Is it feasible to reconstruct body segment 3D position and orientation using accelerometric data, '' IEEE Trans. Biomed. Eng., vol. 50, no. 5, pp. 25-35, Apr. 2003.
-
(2003)
IEEE Trans. Biomed. Eng.
, vol.50
, Issue.5
, pp. 25-35
-
-
Giansanti, D.1
Macellari, V.2
Maccioni, G.3
-
10
-
-
44449155290
-
HB#: Increasing the security and efficiency of HBC
-
H. Gilbert, M. Robshaw, and Y. Seurin, ''HB#: Increasing the security and efficiency of HBC, '' in Proc. Adv. Cryptol. Int. Conf. Theory Appl. Cryptograph. Tech., 2008, pp. 361-378.
-
(2008)
Proc. Adv. Cryptol. Int. Conf. Theory Appl. Cryptograph. Tech.
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.2
Seurin, Y.3
-
11
-
-
84861619902
-
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model (concise contribution)
-
T. Halevi, S. Lin, D. Ma, A. K. Prasad, N. Saxena, J. Voris, et al., ''Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model (concise contribution), '' in Proc. Int. Conf. Pervas. Comput. Commun., 2012, pp. 1-8.
-
(2012)
Proc. Int. Conf. Pervas. Comput. Commun.
, pp. 1-8
-
-
Halevi, T.1
Lin, S.2
Ma, D.3
Prasad, A.K.4
Saxena, N.5
Voris, J.6
-
12
-
-
84865611928
-
Secure proximity detection for NFC devices based on ambient sensor data
-
T. Halevi, D. Ma, N. Saxena, and T. Xiang, ''Secure proximity detection for NFC devices based on ambient sensor data, '' in Proc. ESORICS, 2012, pp. 379-396.
-
(2012)
Proc. ESORICS
, pp. 379-396
-
-
Halevi, T.1
Ma, D.2
Saxena, N.3
Xiang, T.4
-
14
-
-
38549131714
-
Vulnerabilities in -rst-generation RFID-enabled credit cards
-
T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. O'Hare, ''Vulnerabilities in -rst-generation RFID-enabled credit cards, '' in Proc. Financial Cryptograph., 2007, pp. 2-14.
-
(2007)
Proc. Financial Cryptograph.
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'Hare, T.5
-
15
-
-
84958053246
-
NeuralWISP: An energy-harvesting wireless neural interface with 1-m range
-
J. Holleman, D. Yeager, R. Prasad, J. Smith, and B. Otis, ''NeuralWISP: An energy-harvesting wireless neural interface with 1-m range, '' in Proc. Biomed. Circuits Syst. Conf., 2008, pp. 1-5.
-
(2008)
Proc. Biomed. Circuits Syst. Conf.
, pp. 1-5
-
-
Holleman, J.1
Yeager, D.2
Prasad, R.3
Smith, J.4
Otis, B.5
-
16
-
-
84958038129
-
-
Honeywell Morristown, NJ USA.
-
Honeywell, Morristown, NJ, USA. (2013). HMC1053 3-axis Magnetic Sensor [Online]. Available: http://www.honeywell-sensor. com.cn/prodinfo/sensor-magnetic/datasheet/HMC1053.pdf
-
(2013)
HMC1053 3-axis Magnetic Sensor
-
-
-
17
-
-
65249152452
-
3D orientation tracking based on unscented Kalman -ltering of accelerometer and magnetometer data
-
Feb.
-
B. Huyghe and J. Doutreloigne, ''3D orientation tracking based on unscented Kalman -ltering of accelerometer and magnetometer data, '' in Proc. IEEE Sensors Appl. Symp., Feb. 2009, pp. 148-152.
-
(2009)
Proc. IEEE Sensors Appl. Symp.
, pp. 148-152
-
-
Huyghe, B.1
Doutreloigne, J.2
-
18
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb.
-
A. Juels, ''RFID security and privacy: A research survey, '' IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 381-394, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
19
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
A. Juels, R. L. Rivest, and M. Szydlo, ''The blocker tag: Selective blocking of RFID tags for consumer privacy, '' in Proc. ACM CCS, 2003, pp. 103-111.
-
(2003)
Proc. ACM CCS
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
20
-
-
33746092119
-
High-power proxies for enhancing RFID privacy and utility
-
A. Juels, P. F. Syverson, and D. V. Bailey, ''High-power proxies for enhancing RFID privacy and utility, '' in Proc. 5th Int. Conf. Privacy Enhancing, 2005, pp. 210-226.
-
(2005)
Proc. 5th Int. Conf. Privacy Enhancing
, pp. 210-226
-
-
Juels, A.1
Syverson, P.F.2
Bailey, D.V.3
-
21
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
A. Juels and S. Weis, ''Authenticating pervasive devices with human protocols, '' in Proc. Int. Cryptol. Conf., 2005, pp. 293-308.
-
(2005)
Proc. Int. Cryptol. Conf.
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
22
-
-
33847249519
-
Security and privacy issues in E-passports
-
A. Juels, D. Molnar, and D. Wagner, ''Security and privacy issues in E-passports, '' in Proc. 1st Int. Conf. Security Privacy Emerging Areas Commun. Netw., 2005, pp. 74-88.
-
(2005)
Proc. 1st Int. Conf. Security Privacy Emerging Areas Commun. Netw.
, pp. 74-88
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
25
-
-
70449645004
-
UWave: Accelerometer-based personalized gesture recognition and its applications
-
Dec.
-
J. Liu, Z.Wang, L. Zhong, J.Wickramasuriya, and V. Vasudevan, ''uWave: Accelerometer-based personalized gesture recognition and its applications, '' Pervasive Mobile Comput., vol. 5, no. 6, pp. 657-575, Dec. 2009.
-
(2009)
Pervasive Mobile Comput.
, vol.5
, Issue.6
, pp. 657-675
-
-
Liu, J.1
Wang, Z.2
Zhong, L.3
Wickramasuriya, J.4
Vasudevan, V.5
-
26
-
-
84860673845
-
Location-aware and safer cards: Enhancing RFID security and privacy via location sensing
-
D. Ma, A. K. Prasad, N. Saxena, and T. Xiang, ''Location-aware and safer cards: Enhancing RFID security and privacy via location sensing, '' in Proc. WISEC, 2012, pp. 51-62.
-
(2012)
Proc. WISEC
, pp. 51-62
-
-
Ma, D.1
Prasad, A.K.2
Saxena, N.3
Xiang, T.4
-
27
-
-
84875009624
-
Location-aware and safer cards: Enhancing RFID security and privacy via location sensing
-
Mar./Apr.
-
D. Ma, N. Saxena, T. Xiang, and Y. Zhu, ''Location-aware and safer cards: Enhancing RFID security and privacy via location sensing, '' IEEE Trans. Dependable Sec. Comput., vol. 10, no. 2, pp. 57-69, Mar./Apr. 2013.
-
(2013)
IEEE Trans. Dependable Sec. Comput.
, vol.10
, Issue.2
, pp. 57-69
-
-
Ma, D.1
Saxena, N.2
Xiang, T.3
Zhu, Y.4
-
29
-
-
26444435642
-
RFID guardian: A battery-powered mobile device for RFID privacy management
-
M. R. Rieback, B. Crispo, and A. S. Tanenbaum, ''RFID guardian: A battery-powered mobile device for RFID privacy management, '' in Proc. ACISP, 2005, pp. 184-194.
-
(2005)
Proc. ACISP
, pp. 184-194
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
30
-
-
79960857001
-
-
Jan.
-
A. Ruhanen. (Jan. 2008). Sensor-Enabled RFID Tag Handbook [Online]. Available: http://www.bridge-project.eu/data/File/BRIDGE-WP01-RFID-tag-handbook.pdf
-
(2008)
Sensor-Enabled RFID Tag Handbook
-
-
Ruhanen, A.1
-
31
-
-
84858390549
-
Design of a passivelypowered, programmable sensing platform for UHF RFID systems
-
Mar.
-
A. Sample, D. Yeager, P. Powledge, and J. Smith, ''Design of a passivelypowered, programmable sensing platform for UHF RFID systems, '' in Proc. IEEE Int. Conf. RFID, Mar. 2007, pp. 149-156.
-
(2007)
Proc. IEEE Int. Conf. RFID
, pp. 149-156
-
-
Sample, A.1
Yeager, D.2
Powledge, P.3
Smith, J.4
-
32
-
-
70349286554
-
A capacitive touch interface for passive RFID tags
-
Apr.
-
A. Sample, D. J. Yeager, and J. R. Smith, ''A capacitive touch interface for passive RFID tags, '' in Proc. IEEE Int. Conf. RFID, Apr. 2009, pp. 103-109.
-
(2009)
Proc. IEEE Int. Conf. RFID
, pp. 103-109
-
-
Sample, A.1
Yeager, D.J.2
Smith, J.R.3
-
33
-
-
78649255421
-
Directional antenna diversity for mobile devices: Characterizations and solutions
-
Sep.
-
A. A. Sani, L. Zhong, and A. Sabharwal, ''Directional antenna diversity for mobile devices: Characterizations and solutions, '' in Proc. 16th ACM MobiCom, Sep. 2010, pp. 221-232.
-
(2010)
Proc. 16th ACM MobiCom
, pp. 221-232
-
-
Sani, A.A.1
Zhong, L.2
Sabharwal, A.3
-
34
-
-
79957950088
-
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags
-
Mar.
-
N. Saxena, B. Uddin, J. Voris, and N. Asokan, ''Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags, '' in Proc. IEEE Int. Conf. Pervas. Comput. Commun., Mar. 2011, pp. 181-188.
-
(2011)
Proc. IEEE Int. Conf. Pervas. Comput. Commun.
, pp. 181-188
-
-
Saxena, N.1
Uddin, B.2
Voris, J.3
Asokan, N.4
-
35
-
-
78650080956
-
Still and silent: Motion detection for enhanced RFID security and privacy without changing the usage model
-
Jun.
-
N. Saxena and J. Voris, ''Still and silent: Motion detection for enhanced RFID security and privacy without changing the usage model, '' in Proc. Workshop RFID Security, Jun. 2010, pp. 2-21.
-
(2010)
Proc. Workshop RFID Security
, pp. 2-21
-
-
Saxena, N.1
Voris, J.2
-
36
-
-
33750345292
-
A wirelesslypowered platform for sensing and computation
-
J. R. Smith, P. S. Powledge, S. Roy, and A. Mamishev, ''A wirelesslypowered platform for sensing and computation, '' in Proc. 8th Int. Conf. Ubiquitous Comput., 2006, pp. 495-506.
-
(2006)
Proc. 8th Int. Conf. Ubiquitous Comput.
, pp. 495-506
-
-
Smith, J.R.1
Powledge, P.S.2
Roy, S.3
Mamishev, A.4
-
38
-
-
40649129071
-
A simplified quaternionbased algorithm for orientation estimation from earth gravity and magnetic field measurements
-
Mar.
-
X. Yun, E. R. Bachmann, and R. B. McGhee, ''A simplified quaternionbased algorithm for orientation estimation from earth gravity and magnetic field measurements, '' IEEE Tran. Instrum. Meas., vol. 57, no. 3, pp. 638-650, Mar. 2008.
-
(2008)
IEEE Tran. Instrum. Meas.
, vol.57
, Issue.3
, pp. 638-650
-
-
Yun, X.1
Bachmann, E.R.2
McGhee, R.B.3
|