Read / Write Performance for low memory passive HF RFID tag-reader system
暂无分享,去创建一个
[1] Diana Twede,et al. Radio frequency identification (RFID) performance: the effect of tag orientation and package contents , 2006 .
[2] Pawel Rotter,et al. A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.
[3] Daniel D. Deavours,et al. Evaluation of the State of Passive UHF RFID: An Experimental Approach , 2007, IEEE Systems Journal.
[4] Adam Freeman,et al. Programming .Net Security , 2003 .
[5] Raphael C.-W. Phan,et al. Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI , 2009, IEEE Transactions on Dependable and Secure Computing.
[6] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[7] Li Liu,et al. RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[8] Rajit Gadh,et al. Radio frequency identification: beyond the myths. A case for health care , 2008 .
[9] Wei Tsang Ooi,et al. WinRFID: A Middleware for the Enablement of Radiofrequency Identification (RFID)Based Applications , 2005 .
[10] Kay Eager. Zebra , 2001, Journal of pastoral care.
[11] Fan Wu,et al. The application of RFID on drug safety of inpatient nursing healthcare , 2005, ICEC '05.
[12] Daniel D. Deavours,et al. Performance benchmarks for passive UHF RFID tags , 2006, MMB.
[13] Tatsuo Arai,et al. Parts and packets unification radio frequency identification (RFID) application for construction , 2005 .
[14] Rajit Gadh,et al. On the Identification Device Management and Data Capture via WinRFID1 Edge-Server , 2007, IEEE Systems Journal.
[15] Wolf-Christian Rumsch,et al. Challenges for RFID Cross-Industry Standardization in the Light of Diverging Industry Requirements , 2008, IEEE Systems Journal.
[16] Dong Hoon Lee,et al. Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.
[17] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[18] Katina Michael,et al. RFID and Supply Chain Management: Introduction to the Special Issue , 2008, J. Theor. Appl. Electron. Commer. Res..
[19] K. Shadan,et al. Available online: , 2012 .
[20] Ronald E. Rice,et al. Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology , 2009, Int. J. Medical Informatics.
[21] Pawel Rotter,et al. RFID implants: Opportunities and and challenges for identifying people , 2008, IEEE Technology and Society Magazine.
[22] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[23] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[24] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[25] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[26] R. Gadh,et al. WinRFID – A Middleware for the enablement of Radio Frequency Identification ( RFID ) based Applications , 2005 .
[27] C. M. Roberts,et al. Radio frequency identification (RFID) , 2006, Comput. Secur..
[28] Rajit Gadh,et al. APPLICATIONS OF RFID TECHNOLOGY AND SMART PARTS IN MANUFACTURING , 2004 .
[29] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[30] Rajit Gadh,et al. On the Utilization and Integration of RFID Data Into Enterprise Information Systems Via WinRFID , 2007 .
[31] Oscal T.-C. Chen,et al. Low-Complexity Encryption Using Redundant Bits and Adaptive Frequency Rates in RFID , 2007, 2007 IEEE International Symposium on Circuits and Systems.
[32] Rajit Gadh,et al. Radio Frequency Identification of Katrina Hurricane Victims , 2006 .
[33] Fan Yang,et al. An improved approach to security and privacy of RFID application system , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..
[34] Rajit Gadh,et al. Service organization and discovery for facilitating RFID network manageability and usability via WinRFID middleware , 2008, 2008 Wireless Telecommunications Symposium.
[35] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[36] Bo Sheng,et al. Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.
[37] Jiang-Liang Hou,et al. Quantitative performance evaluation of RFID applications in the supply chain of the printing industry , 2006, Ind. Manag. Data Syst..