Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
Formulation of a two-level electronic security and protection system for malls
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 16, Issue 12024, Pages 63–72https://doi.org/10.1504/ijesdf.2024.136019Electronics are everywhere around us these days, and many of them help us maintain security in different locations. However, there are still numerous security issues that banks, residences, and other establishments must deal with. The real-time ...
- research-articleJuly 2022
A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system
Computer Communications (COMS), Volume 191, Issue CJul 2022, Pages 425–437https://doi.org/10.1016/j.comcom.2022.05.002AbstractAs a result of remarkable and continuous progress in Micro-Electro-Mechanical technologies, improved user-friendliness of low cast telecommunications like IoTs, mobile networks virtualization and intelligent technologies, we have novel ...
- research-articleMay 2022
URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system
The Journal of Supercomputing (JSCO), Volume 78, Issue 8May 2022, Pages 10893–10905https://doi.org/10.1007/s11227-021-04252-yAbstractRFID (Radio Frequency Identification) is a crucial application technology in the Internet of Things (IoT) technology. The IoT terminal device needs to be authenticated before accessing the IoT network in order to avoid security holes. Due to the ...
- research-articleJanuary 2022
IoT technologies for wine supply chain traceability: potential application in the Southern Apulia Region (Italy)
Procedia Computer Science (PROCS), Volume 200, Issue C2022, Pages 1125–1134https://doi.org/10.1016/j.procs.2022.01.312AbstractThe high value and volume of Italian wine production determines a strong stimulus for counterfeiting, which generates negative consequences for grape growers, winemakers and consumers. In this context, IoT technologies and the blockchain can serve ...
- research-articleOctober 2021
Flower shaped frequency coded chipless RFID tag for low cost item tracking
Analog Integrated Circuits and Signal Processing (KLU-ALOG), Volume 109, Issue 1Oct 2021, Pages 79–91https://doi.org/10.1007/s10470-021-01912-0AbstractA Flower Shaped Frequency Coded Chip-less RFID Tag with a fully printable and polarization-independent tag is discussed in this paper. The tag encodes a data capacity of 12 bits. The data is encoded and transmitted using the RF encoding particle ...
-
- research-articleSeptember 2021
Multi-scale recursive codec network with authority parameters (MRCN-AP) for RFID multi-label deblurring
Multimedia Tools and Applications (MTAA), Volume 80, Issue 21-23Sep 2021, Pages 32149–32169https://doi.org/10.1007/s11042-021-11216-0AbstractThe dynamic non-uniform blur caused by Radio Frequency Identification (RFID) multi-label motion seriously affects the identification and location of labels. It is an ill-posed inverse problem for that the blur kernel and sharp image are unknown. ...
- review-articleJuly 2020
Internet of Things (IoT) in Pharmaceutical Manufacturing, Warehousing, and Supply Chain Management
AbstractInternet of Things (IoT) is a buzzword in the area of information technology. The Internet of Things is an interconnected computer system with unique identifiers (UIDs) that are capable of transmitting information over a network. This review ...
- ArticleOctober 2018
Clinical Trial of Information Acquisition System for Surgical Instruments in Digital Operation Room
OR 2.0 Context-Aware Operating Theaters, Computer Assisted Robotic Endoscopy, Clinical Image-Based Procedures, and Skin Image AnalysisSep 2018, Pages 78–84https://doi.org/10.1007/978-3-030-01201-4_10AbstractTo prevent incidents in which surgical items are retained in a patient’s body, a unique device system (UDS) of surgical instruments in the operation room is required. In our previous study, we developed surgical instruments with radio-frequency ...
- articleAugust 2017
Design of a RFID System for Real-Time Tracking of Laboratory Animals
Wireless Personal Communications: An International Journal (WPCO), Volume 95, Issue 4August 2017, Pages 3883–3903https://doi.org/10.1007/s11277-017-4030-9In this paper, a real-time RFID system capable of tracking laboratory animals is designed and implemented. Four passive RFID tags based on low frequency are designed and implemented. The tags can be read by any RFID reader that operates on the low ...
- articleMarch 2017
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
The Journal of Supercomputing (JSCO), Volume 73, Issue 3March 2017, Pages 1085–1102Internet of Things (IoT) is an evolving architecture which connects multiple devices to Internet for communication or receiving updates from a cloud or a server. In future, the number of these connected devices will increase immensely making them an ...
- articleJuly 2016
Vehicular Ad hoc Networks: A hybrid approach to data dissemination in exigency situations
Wireless Networks (WIRE), Volume 22, Issue 5July 2016, Pages 1725–1737https://doi.org/10.1007/s11276-015-1052-7Vehicular Ad hoc Network (VANET) is a type of mobile ad hoc network based on short range communications among vehicles moving on roads and between moving vehicles and road side units. Endangerment situations occur when a vehicle met with an accident at ...
- research-articleApril 2016
Fast and scalable counterfeits estimation for large-scale RFID systems
IEEE/ACM Transactions on Networking (TON), Volume 24, Issue 2Pages 1052–1064https://doi.org/10.1109/TNET.2015.2406669Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, ...
- articleJanuary 2016
The use of RFID tags to support the post-disaster recovery of utility infrastructure
International Journal of Information Technology and Management (IJITM), Volume 15, Issue 4January 2016, Pages 333–345https://doi.org/10.1504/IJITM.2016.079604The smart, IT-enabled infrastructure requires utilities to geospatially map their facilities and be able to locate them quickly after they get buried or broken during disasters. In this paper, we describe a collaboration between a university research ...
- ArticleNovember 2014
A Novel ESD Protection Circuit for Passive RFID Transponder
ICDH '14: Proceedings of the 2014 5th International Conference on Digital HomeNovember 2014, Pages 252–256https://doi.org/10.1109/ICDH.2014.55This paper presents silicon proved ESD protection circuit for RFID transponder using 180nm CMOS process. The circuit can also be reused for the functions of rectifier and amplitude limiter. Such method not only reduces RFID transponder's area but also ...
- research-articleAugust 2014
Wise counting: fast and efficient batch authentication for large-scale RFID systems
MobiHoc '14: Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computingAugust 2014, Pages 347–356https://doi.org/10.1145/2632951.2632963Radio Frequency Identification technology (RFID) is widely used in many applications, such as asset monitoring, e-passport and electronic payment, and is becoming one of the most effective solutions in cyber physical system. Since the identification ...
- ArticleMarch 2014
Novel Encoding Method for Non-contact IC Card or RFID Systems
UKSIM '14: Proceedings of the 2014 UKSim-AMSS 16th International Conference on Computer Modelling and SimulationMarch 2014, Pages 568–570https://doi.org/10.1109/UKSim.2014.38We propose a novel encoding method for non-contact IC card or RFID systems. The Manchester code that is currently used for non-contact IC card or RFID systems requires a phase-locked loop (PLL) because intervals of the state transition change. In our ...
- research-articleJuly 2013
Informative counting: fine-grained batch authentication for large-scale RFID systems
MobiHoc '13: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computingJuly 2013, Pages 21–30https://doi.org/10.1145/2491288.2491299Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address the scalability issue in batch authentications. Deterministic approaches verify them one by one,...
- research-articleJuly 2013
ASAP: Scalable Collision Arbitration for Large RFID Systems
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 7July 2013, Pages 1277–1288https://doi.org/10.1109/TPDS.2012.64The growing importance of operations such as identification, location sensing, and object tracking has led to increasing interests in contactless Radio Frequency Identification (RFID) systems. Enjoying the low cost of RFID tags, modern RFID systems tend ...
- research-articleJuly 2013
RFID Support for Accurate 3D Localization
IEEE Transactions on Computers (ITCO), Volume 62, Issue 7July 2013, Pages 1447–1459https://doi.org/10.1109/TC.2012.83This paper pursues RFID support for localization, aiming to pinpoint an object in 3D space. Given a set of RFID tags and/or readers deployed as reference points at known locations in a hexahedron (like shipping container or storage room), a passive and ...
- articleFebruary 2013
An internet of old things as an augmented memory system
Personal and Ubiquitous Computing (PUC), Volume 17, Issue 2Pages 321–333https://doi.org/10.1007/s00779-011-0496-8The interdisciplinary Tales of Things and electronic Memory (TOTeM) project investigates new contexts for augmenting things with stories in the emerging culture of the Internet of Things (IoT). Tales of Things is a tagging system which, based on two-...