The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study systems where a reader wants to authenticate and identify legitimate RFID tags. Such system needs thus to be correct (legitimate tags are accepted) and sound (fake tags are rejected). Moreover, an RFID tag in a privacy-preserving system should be anonymous and untraceable, except for the legitimate reader. We here present the first security model for RFID authentication/identification...
These instructions give you guidelines for preparing papers for IEEE conferences Use this document as a template if you are using Microsoft Word 6.0 or later. Otherwise, use this document as an instruction set. Instructions about final paper and figure submissions in this document are for IEEE journals; please use this document as a "template" to prepare your manuscript. For submission guidelines,...
This paper proposes a new technique to modify the original design of a known antenna according to the requirement of a new chip with an input impedance different from the first design This methodology is based on the idea of creating a database with antenna simulations and use Artificial Neural Networks (ANN) as a tool for selection of the appropriated configurations necessary for a better performance.
A so-called tag-collision problem (or missed reads) in Radio Frequency Identification (RFID) system is the event that a reader cannot identify the tag if many tags respond to a reader at the same time. In this paper, we propose an adaptive query tree (AQT) protocols that combine the multiple M-ary trees. The large M reduces collisions, while the small M avoids the unnecessary inquiries. Our AQT protocol...
Routing inspection is one of the important tasks on communication equipment security administration of Base Transceiver Station(BTS). This paper proposes a kind of system architecture for BTS routing inspection system based on RFID. And then the software and hardware design for the intelligent RFID handhold reader have been analyized. Practical applications show that the system may be preferably and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.