Works matching IS 16174909 AND DT 2012 AND VI 16 AND IP 3
Results: 11
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 323, doi. 10.1007/s00779-011-0392-2
- By:
- Publication type:
- Article
Security flaws in a recent RFID delegation protocol.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 337, doi. 10.1007/s00779-011-0393-1
- By:
- Publication type:
- Article
RFID-based location-sensing system for safety management.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 235, doi. 10.1007/s00779-011-0394-0
- By:
- Publication type:
- Article
X-CleLo: intelligent deterministic RFID data and event transformer.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 259, doi. 10.1007/s00779-011-0397-x
- By:
- Publication type:
- Article
A GA-based mobile RFID localization scheme for internet of things.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 245, doi. 10.1007/s00779-011-0398-9
- By:
- Publication type:
- Article
A secure distance-based RFID identification protocol with an off-line back-end database.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 351, doi. 10.1007/s00779-011-0396-y
- By:
- Publication type:
- Article
Adding sense to the Internet of Things.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 291, doi. 10.1007/s00779-011-0399-8
- By:
- Publication type:
- Article
Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 271, doi. 10.1007/s00779-011-0390-4
- By:
- Publication type:
- Article
Evaluation and exploration of RFID systems by rapid prototyping.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 309, doi. 10.1007/s00779-011-0391-3
- By:
- Publication type:
- Article
Gesture recognition using RFID technology.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 225, doi. 10.1007/s00779-011-0395-z
- By:
- Publication type:
- Article
User-driven RFID applications and challenges.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 3, p. 223, doi. 10.1007/s00779-011-0444-7
- By:
- Publication type:
- Article