RFID Emulation in Rifidi Environment
暂无分享,去创建一个
[1] P. Popovski. Tree Protocols for RFID Tags with Generalized Arbitration Spaces , 2008, 2008 IEEE 10th International Symposium on Spread Spectrum Techniques and Applications.
[2] Yunhao Liu,et al. LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[3] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[4] Katina Michael,et al. The pros and cons of RFID in supply chain management , 2005, International Conference on Mobile Business (ICMB'05).
[5] Dongho Won,et al. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.
[6] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[7] Harald Vogt,et al. Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.
[8] Christian Floerkemeier,et al. RFID middleware design: addressing application requirements and RFID constraints , 2005, sOc-EUSAI '05.
[9] Harald Vogt,et al. Multiple object identification with passive RFID tags , 2002, IEEE International Conference on Systems, Man and Cybernetics.
[10] Daniel W. Engels,et al. The reader collision problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.