Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2016
Fast and scalable counterfeits estimation for large-scale RFID systems
IEEE/ACM Transactions on Networking (TON), Volume 24, Issue 2Pages 1052–1064https://doi.org/10.1109/TNET.2015.2406669Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, ...
- research-articleAugust 2014
Wise counting: fast and efficient batch authentication for large-scale RFID systems
MobiHoc '14: Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computingAugust 2014, Pages 347–356https://doi.org/10.1145/2632951.2632963Radio Frequency Identification technology (RFID) is widely used in many applications, such as asset monitoring, e-passport and electronic payment, and is becoming one of the most effective solutions in cyber physical system. Since the identification ...