High-performance complex event processing over streams
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Supporting Colocated Interactions Using RFID and Social Network Displays
IEEE Pervasive Computing
International Journal of Internet Protocol Technology
An FPGA-based implementation of the Pomaranch stream cipher
Proceedings of the 3rd international conference on Mobile multimedia communications
Piloting RFID Along the Supply Chain: A Case Analysis
Electronic Markets - 'eValues'
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Multi-agent System for Management and Monitoring of Routes Surveillance
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
An active product state tracking architecture in logistics sensor networks
Computers in Industry
Efficient probabilistic event stream processing with lineage and Kleene-plus
International Journal of Communication Networks and Distributed Systems
Privacy-aware security applications using RFID technology
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Partial constraint checking for context consistency in pervasive computing
ACM Transactions on Software Engineering and Methodology (TOSEM)
Design and implementation of RFID mutual authentication protocol
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A trust-third-party based key management protocol for secure mobile RFID service
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Radio frequency identification: a case study of healthcare organisations
International Journal of Security and Networks
A multi-agent architecture for RFID taxonomy
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Susceptibility of UHF RFID tags to electromagnetic analysis
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Efficient architectures for elliptic curve cryptography processors for RFID
ICCD'09 Proceedings of the 2009 IEEE international conference on Computer design
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Secure RFID authentication with efficient key-lookup
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Fast RFID counting under unreliable radio channels
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
MAMECTIS'10 Proceedings of the 12th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
WSEAS TRANSACTIONS on COMMUNICATIONS
Ubiquitous computing: An overview of technology impacts
Telematics and Informatics
Automated management of assets based on RFID triggered alarm messages
Information Systems Frontiers
Distributed inference and query processing for RFID tracking and monitoring
Proceedings of the VLDB Endowment
Security problems of RFID authentication protocols
ICOSSSE'07 Proceedings of the 6th WSEAS international conference on System science and simulation in engineering
Extending an RFID security and privacy model by considering forward untraceability
STM'10 Proceedings of the 6th international conference on Security and trust management
Implementation of terminal middleware platform for mobile RFID computing
International Journal of Ad Hoc and Ubiquitous Computing
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Enhanced security and privacy mechanism of RFID service for pervasive mobile device
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A design of privacy conscious RFID system using customizing privacy policy based access control
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Untraceable tags based on mild assumptions
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Automation systems in public administration of the municipality of Sao Paulo
CSCC'11 Proceedings of the 2nd international conference on Circuits, Systems, Communications & Computers
Survey: Innovative approaches for security of small artefacts
Computer Science Review
RFID in Healthcare: A Framework of Uses and Opportunities
International Journal of Advanced Pervasive and Ubiquitous Computing
International Journal of E-Business Research
Single tag sharing scheme for multiple-object RFID applications
Multimedia Tools and Applications
Hi-index | 0.00 |