Search Results

There are 14221 results for: content related to: A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems

  1. RFID Tag Performance: Linking the Laboratory to the Field through Unsupervised Learning

    Production and Operations Management

    Scott C. Ellis, Shashank Rao, Dheeraj Raju and Thomas J. Goldsby

    Version of Record online : 6 OCT 2017, DOI: 10.1111/poms.12785

  2. Guidelines for the Use of RFID Technology in Transfusion Medicine

    Vox Sanguinis

    Volume 98, Issue s2, April 2010, Pages: 1–24,

    Version of Record online : 1 APR 2010, DOI: 10.1111/j.1423-0410.2010.01324.x

  3. Development of automatic system for monitoring fishing effort in conger-eel tube fishery using radio frequency identification and global positioning system

    Fisheries Science

    Volume 71, Issue 5, October 2005, Pages: 992–1002, Keiichi UCHIDA, Nobuaki ARAI, Kazuyuki MORIYA, Yoshinori MIYAMOTO, Toshiharu KAKIHARA and Tadashi TOKAI

    Version of Record online : 18 OCT 2005, DOI: 10.1111/j.1444-2906.2005.01056.x

  4. User-centric secure integration of personal RFID tags and sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1177–1197, Pablo Najera, Rodrigo Roman and Javier Lopez

    Version of Record online : 19 FEB 2013, DOI: 10.1002/sec.684

  5. Software abstractions for mobile RFID-enabled applications

    Software: Practice and Experience

    Volume 43, Issue 10, October 2013, Pages: 1219–1239, Andoni Lombide Carreton, Kevin Pinte and Wolfgang De Meuter

    Version of Record online : 31 AUG 2011, DOI: 10.1002/spe.1114

  6. Secure Communication with RFID tags in the Internet of Things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2639–2653, Sandra Dominikus and Stefan Kraxberger

    Version of Record online : 22 NOV 2011, DOI: 10.1002/sec.398

  7. An ultralightweight RFID authentication protocol based on Feistel cipher structure

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6017–6033, Bensalah Mustapha, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 3 FEB 2017, DOI: 10.1002/sec.1754

  8. An aggregated signature-based fast RFID batch detection protocol

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1364–1371, Chaoliang Li, Guojun Wang and Jin Zheng

    Version of Record online : 10 JUL 2013, DOI: 10.1002/sec.838

  9. The Value to the Customer of RFID in Service Applications

    Decision Sciences

    Volume 40, Issue 3, August 2009, Pages: 477–512, Gregory R. Heim, William R. Wentworth Jr. and Xiaosong (David) Peng

    Version of Record online : 31 JUL 2009, DOI: 10.1111/j.1540-5915.2009.00237.x

  10. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2836–2849, Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Version of Record online : 13 FEB 2015, DOI: 10.1002/sec.1208

  11. How to protect security and privacy in the IoT: a policy-based RFID tag management protocol

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2669–2683, Evangelos Rekleitis, Panagiotis Rizomiliotis and Stefanos Gritzalis

    Version of Record online : 9 DEC 2011, DOI: 10.1002/sec.400

  12. Privacy and RFID Technology: A Review of Regulatory Efforts

    Journal of Consumer Affairs

    Volume 51, Issue 2, Summer 2017, Pages: 329–354, Anna M. Turri, Ronn J. Smith and Steven W. Kopp

    Version of Record online : 13 JAN 2017, DOI: 10.1111/joca.12133

  13. You have free access to this content
    Overview of RFID Technology and Its Applications in the Food Industry

    Journal of Food Science

    Volume 74, Issue 8, October 2009, Pages: R101–R106, P. Kumar, H.W. Reinitz, J. Simunovic, K.P. Sandeep and P.D. Franzon

    Version of Record online : 11 SEP 2009, DOI: 10.1111/j.1750-3841.2009.01323.x

  14. Radio Frequency Identification (RFID)

    Standard Article

    Wiley Encyclopedia of Electrical and Electronics Engineering

    Andrew Shields, Ultan Mc Carthy, Daniel Riordan, Pat Doody, Joseph Walsh and Ismail Uysal

    Published Online : 15 SEP 2015, DOI: 10.1002/047134608X.W8155

  15. Security enhancement of the authenticated RFID security mechanism based on chaotic maps

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2356–2372, Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 16 JAN 2014, DOI: 10.1002/sec.946

  16. Chaotic masking for securing RFID systems against relay attacks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1496–1508, Behzad Malek and Ali Miri

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.586

  17. Radio Frequency Identification Technology

    Standard Article

    Kirk-Othmer Encyclopedia of Chemical Technology

    William Mccombie and Bruce A. Welt

    Published Online : 15 APR 2011, DOI: 10.1002/0471238961.radiwelt.a01

  18. Distance-bounding trust protocol in anonymous radio-frequency identification systems

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 16, November 2015, Pages: 4211–4229, Fan Yang, Fengli Zhang, Jiahao Wang, Zhiguang Qin and Xiaolu Yuan

    Version of Record online : 5 JUN 2015, DOI: 10.1002/cpe.3500

  19. Applications of radio frequency identification (RFID) in ornithological research: a review

    Journal of Field Ornithology

    Volume 82, Issue 1, March 2011, Pages: 1–10, David N. Bonter and Eli S. Bridge

    Version of Record online : 23 FEB 2011, DOI: 10.1111/j.1557-9263.2010.00302.x

  20. Simulations and experiments for optimal deployment of an RFID-based location-aware system

    Wireless Communications and Mobile Computing

    Volume 11, Issue 6, June 2011, Pages: 679–691, Pang-Wei Hsu, Tzong-Huei Lin, Herbert H. Chang, Yu-Ting Chen, Yin-Jiun Tseng, Chia-Hung Hsiao, Chia-Tai Chan, Hung-Wen Chiu, David Hung-Tsang Yen, Po-Chou Chen and Woei-Chyn Chu

    Version of Record online : 21 SEP 2009, DOI: 10.1002/wcm.848