Bridging physical and virtual worlds with electronic tags
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Application level active networking
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on high-performance protocol architectures
A tangible interface for organizing information using a grid
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The future of business services in the age of ubiquitous computing
Communications of the ACM
Virtual Organizations, Pervasive Computing, and an Infrastructure for Networking at the Edge
Information Systems Frontiers
From Informing to Remembering: Ubiquitous Systems in Interactive Museums
IEEE Pervasive Computing
Efficient Object Identification with Passive RFID Tags
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Developing Consumer-Friendly Pervasive Retail Systems
IEEE Pervasive Computing
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
The Networked Physical World: An Automated Identification Architecture
WIAPP '01 Proceedings of the Second IEEE Workshop on Internet Applications (wiapp '01)
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Designing appliances for mobile commerce and retailtainment
Personal and Ubiquitous Computing
The Periscope: supporting a computer enhanced field trip for children
Personal and Ubiquitous Computing
The sensor spectrum: technology, trends, and requirements
ACM SIGMOD Record
Applications of context-aware computing in hospital work: examples and design principles
Proceedings of the 2004 ACM symposium on Applied computing
Context-aware design and interaction in computer systems
IBM Systems Journal
Augmenting the social space of an academic conference
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Smart identification frameworks for ubiquitous computing applications
Wireless Networks - Special issue: Pervasive computing and communications
Consumer perceptions of privacy, security and trust in ubiquitous commerce
Personal and Ubiquitous Computing
RFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy
Short-range wireless technologies with mobile payments systems
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Ubiquitous and Pervasive Commerce: New Frontiers for Electronic Business (Computer Communications and Networks)
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
Temporal management of RFID data
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Disabling RFID tags with visible confirmation: clipped tags are silenced
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
A Model-Driven Approach to RFID Application Programming and Infrastructure Management
ICEBE '05 Proceedings of the IEEE International Conference on e-Business Engineering
RFID Information Grid for Blind Navigation and Wayfinding
ISWC '05 Proceedings of the Ninth IEEE International Symposium on Wearable Computers
Hands-On RFID: Wireless Wearables for Detecting Use of Objects
ISWC '05 Proceedings of the Ninth IEEE International Symposium on Wearable Computers
RFID middleware design: addressing application requirements and RFID constraints
Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
An Introduction to RFID Technology
IEEE Pervasive Computing
RFID-Based Facility Maintenance at Frankfurt Airport
IEEE Pervasive Computing
Requesting Pervasive Services by Touching RFID Tags
IEEE Pervasive Computing
LotTrack: RFID-Based Process Control in the Semiconductor Industry
IEEE Pervasive Computing
Self-Powered Wireless Temperature Sensors Exploit RFID Technology
IEEE Pervasive Computing
Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Computer
High-performance complex event processing over streams
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Supporting Colocated Interactions Using RFID and Social Network Displays
IEEE Pervasive Computing
Adaptive cleaning for RFID data streams
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Bridging the physical and virtual worlds by local connectivity-based physical selection
Personal and Ubiquitous Computing
IEEE Internet Computing
The mobile phone as a digital SprayCan
Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology
Global RFID: The Value of the EPCglobal Network for Supply Chain Management
Global RFID: The Value of the EPCglobal Network for Supply Chain Management
Gesture connect: facilitating tangible interaction with a flick of the wrist
Proceedings of the 1st international conference on Tangible and embedded interaction
Pervasive pheromone-based interaction with RFID tags
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Architecture design and performance evaluation of RFID object tracking systems
Computer Communications
Ubiquitous computing in the real world: lessons learnt from large scale RFID deployments
Personal and Ubiquitous Computing
Bluebot: Asset tracking via robotic location crawling
Computer Communications
A space-identifying ubiquitous infrastructure and its application for tour-guiding service
Proceedings of the 2008 ACM symposium on Applied computing
Towards guidelines for designing augmented toy environments
Proceedings of the 7th ACM conference on Designing interactive systems
The RF in RFID: Passive UHF RFID in Practice
The RF in RFID: Passive UHF RFID in Practice
E-passport: the global traceability or how to feel like a UPS package
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Design and Optimization of Passive UHF RFID Systems
Design and Optimization of Passive UHF RFID Systems
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
A framework for rapid development of RFID applications
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
AwareMirror: a personalized display using a mirror
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
IEEE Communications Magazine
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Spatial inference using networks of RFID receiver: a Bayesian approach
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Computers and Electronics in Agriculture
Detecting activities from body-worn accelerometers via instance-based algorithms
Pervasive and Mobile Computing
Efficient multiple objects-oriented event detection over RFID data streams
WAIM'10 Proceedings of the 11th international conference on Web-age information management
Dynamic system model for optimal configuration of mobile RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Radio-Mama: An RFID based business process framework for asset management
Journal of Network and Computer Applications
Distributed object-oriented programming with RFID technology
DAIS'10 Proceedings of the 10th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Sensor9k: A testbed for designing and experimenting with WSN-based ambient intelligence applications
Pervasive and Mobile Computing
A feasibility study of a RFID traceability system in municipal solid waste management
International Journal of Information Technology and Management
Journal of Cases on Information Technology
Consumer value of camera-based mobile interaction with the real world
Pervasive and Mobile Computing
Information dissemination framework for context-aware products
Computers and Industrial Engineering
Personal and Ubiquitous Computing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
rfid has already found its way into a variety of large scale applications and arguably it is already one of the most successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic identification technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobile services. In this survey we consider developments towards establishing rfid as the cost-effective technical solution for the development of open, shared, universal pervasive computing infrastructures and look ahead to its future. In particular, we discuss the ingredients of current large scale applications; the role of network services to provide complete systems; privacy and security implications; and how rfid is helping prototype emerging pervasive computing applications. We conclude by identifying common trends in the new applications of rfid and ask questions related to sustainable universal deployment of this technology.