Website: worldcat.org
Rank: 103 / 1500
8 selected articles
RFID handbook : applications, technology, security, and ...
1 online resource (1 volume (various pagings)) : illustrations
Contents:
Chapter 1. Physics and Geometry of RFID --
Chapter 2. EPCglobal Network --
Chapter 3. Design Automation for RFID Tags and Systems --
Chapter 4. Far-Field Tag Antenna Design Methodology --
Chapter 5. Contemporary RFID Reader Architecture --
Chapter 6. Progress in RFID Education --
Section II: Technology --
Chapter 7. RFID...
RFID handbook : applications, technology, security, and ...
1 online resource (1 volume (various pagings)) : illustrations
Contents:
Chapter 1. Physics and Geometry of RFID --
Chapter 2. EPCglobal Network --
Chapter 3. Design Automation for RFID Tags and Systems --
Chapter 4. Far-Field Tag Antenna Design Methodology --
Chapter 5. Contemporary RFID Reader Architecture --
Chapter 6. Progress in RFID Education --
Section II: Technology --
Chapter 7. RFID...
RFID : applications, security, and privacy (Book, 2006 ...
li, 555 pages ; 24 cm
Contents:
Ch. 1. Automatic identification and data collection : what the future holds / Dan Mullen and Bert Moore --
Ch. 2. Understanding RFID technology / Simon Garfinkel and Henry Holtzman --
Ch. 3. A history of the EPC / Sanjay Sarma --
Ch. 4. RFID and global privacy policy / Stephanie Perrin --
Ch. 5. RFID, privacy, and regulation / Jonathan Weinberg --
Ch. 6. RFID and...
RFID Security : Techniques, Protocols and System-on-Chip ...
Design Trade-Offs for Realistic Privacy --
RFID Security: Cryptography and Physics Perspectives --
RFID Anticounterfeiting: An Architectural Perspective --
An Efficient and Secure RFID Security Method with Ownership Transfer --
Digital Signature Transponder --
Scalability Issues in Privacy-Compliant RFID Protocols --
Dynamic Privacy Protection for Mobile RFID Service --
Using...
Related topics : security and privacy in rfid systems / rfid security and privacy issues / rfid based security system / rfid security tag reader / rfid tag security system
RFID Security : Techniques, Protocols and System-on-Chip ...
Design Trade-Offs for Realistic Privacy --
RFID Security: Cryptography and Physics Perspectives --
RFID Anticounterfeiting: An Architectural Perspective --
An Efficient and Secure RFID Security Method with Ownership Transfer --
Digital Signature Transponder --
Scalability Issues in Privacy-Compliant RFID Protocols --
Dynamic Privacy Protection for Mobile RFID Service --
Using...
Related topics : security and privacy in rfid systems / rfid security and privacy issues / rfid based security system / rfid security tag reader / rfid tag security system
RFID security : techniques, protocols and system-on-chip ...
Part II: Security Protocols and Techniques --
Design Trade-Offs for Realistic Privacy --
RFID Security: Cryptography and Physics Perspectives --
RFID Anticounterfeiting: An Architectural Perspective --
An Efficient and Secure RFID Security Method with Ownership Transfer --
Digital Signature Transponder --
Scalability Issues in Privacy-Compliant RFID Protocols --
Dynamic Privacy Protection for...
Related topics : security and privacy in rfid systems / rfid security and privacy issues / rfid based security system / rfid tag security system / rfid security tag reader
RFID security and privacy : concepts, protocols, and ...
Related topics : security and privacy in rfid systems / rfid security and privacy concepts protocols and architectures / epc gen 2 rfid tag / gen 2 rfid tag / rfid tag security system
IEEE RFID 2013 : 2013 IEEE International Conference on ...
All fields are required.
The E-mail Address(es) field is required. Please enter recipient e-mail address(es).
The E-mail Address(es) you entered is(are) not in a valid format. Please re-enter recipient e-mail address(es).
You may send this item to up to five recipients.
Enter recipient e-mail address(es):
Separate up to five addresses with...
Related topics : ieee rfid conference 2013 / ieee rfid conference / rfid usa 2013 / rfid conference orlando / rfid conference
8 Resources