Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
WISE Design of Indoor Wireless Systems: Practical Computation and Optimization
IEEE Computational Science & Engineering
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
LANDMARC: indoor location sensing using active RFID
Wireless Networks - Special issue: Pervasive computing and communications
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
The Horus WLAN location determination system
Proceedings of the 3rd international conference on Mobile systems, applications, and services
A kernel-based learning approach to ad hoc sensor network localization
ACM Transactions on Sensor Networks (TOSN)
Radio interferometric geolocation
Proceedings of the 3rd international conference on Embedded networked sensor systems
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Radio interferometric tracking of mobile wireless nodes
Proceedings of the 5th international conference on Mobile systems, applications and services
VIRE: Active RFID-based Localization Using Virtual Reference Elimination
ICPP '07 Proceedings of the 2007 International Conference on Parallel Processing
Tracking mobile nodes using RF Doppler shifts
Proceedings of the 5th international conference on Embedded networked sensor systems
From data privacy to location privacy: models and algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Spinning beacons for precise indoor localization
Proceedings of the 6th ACM conference on Embedded network sensor systems
Statistical learning theory for location fingerprinting in wireless LANs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling RFID signal strength and tag detection for localization and mapping
ICRA'09 Proceedings of the 2009 IEEE international conference on Robotics and Automation
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Using RF received phase for indoor tracking
Proceedings of the 6th Workshop on Hot Topics in Embedded Networked Sensors
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Hi-index | 0.00 |
Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (radio frequency identification) technology has been shown to be very effective for identification and tracking applications in industry, transport, agriculture and health-care. However it can also be used for accurate object localization. Indeed RFID technology is ideally suited for such applications, and more generally for context-aware computing, because of the low cost, low power, light weight and endurance of RFID tags. In this article we study the security of RFID localization.