


default search action
International Journal of Radio Frequency Identification Technology and Applications, Volume 4
Volume 4, Number 1, 2012
- Chao Lv, Hui Li, Jianfeng Ma, Ben Niu:

Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems. 3-12 - Chiao-Tzu Huang

, Shu-Jen Wang, Jen-Chieh Liao, Wei-Ling Wang:
A rules based RFID-enabled supply chain process monitoring system. 13-27 - Arne Bosien, Volker Turau, Franco Zambonelli

:
Approaches to fast sequential inventory and path following in RFID-enriched environments. 28-48 - Camille Ramade, Sébastien Silvestre, Frédérique Pascal-Delannoy, Brice Sorli:

Thin film HF RFID tag deposited on paper by thermal evaporation. 49-66 - Namje Park

:
Cell phone-based mobile RFID: models, mechanisms and its security. 67-101
Volume 4, Number 2, 2013
- Usama Sayed Mohammed, Mostafa Salah

:
Integrated reader and tag anti-collision protocol in RFID systems based on similar topology trees. 103-121 - Luca Catarinucci

, Riccardo Colella
, Luigi Patrono
:
On the use of passive UHF RFID tags in the pharmaceutical supply chain: a novel enhanced tag versus high-performance commercial tags. 122-137 - G. Varaprasad, R. S. D. Wahidabanu:

Priority-based model for network partition problems for mobile ad hoc networks. 138-148 - Chia-Ming Wu, Siang-Sheng Cheng, Ruay-Shiung Chang:

A data filtering strategy using cluster architecture in radio frequency identification system. 149-161 - Sebastian Wallner, Klaus Finkenzeller:

ISO 14443A active load modulation technology and its integration in the micro-SD card form factor. 162-180 - Johanna Virkki, Toni Björninen

, Juha Virtanen, Leena Ukkonen, Lauri Sydänheimo
, Ming Kim Lim
:
Embedding passive RFID tags into wooden doors for identification and tracking. 181-196 - Joyashree Bag, Subir Kumar Sarkar:

Development and VLSI implementation of a data security scheme for RFID system using programmable cellular automata. 197-211
Volume 4, Number 3, 2014
- Matthew Chan, Xiaowen Zhang:

Simulations of levelled RFID localisation for indoor moving objects. 213-228 - Tanvi Agrawal, P. K. Biswas:

Energy consumption evaluation framework for passive RFID tag anti-collision algorithms. 229-243 - Karri Rantasila, Ville Hinkka

, Eetu Pilli-Sihvola, Antti Permala:
Unveiling the RFID business: a survey of the Finnish RFID sector. 244-259 - Eetu Pilli-Sihvola, Karri Rantasila, Ville Hinkka

, Antti Permala:
The European approach to addressing RFID privacy. 260-271 - Yves Dubromelle, Jean-Pierre Prunaret, Fouzia Ounnar, Patrick Pujo:

RFID synchronisation for ambient services in a holonic and isoarchic control model. 272-290
Volume 4, Number 4, 2015
- Jenn Tang:

A new RFID-based and ontological recreation system for blind people. 291-308 - Jiaqing Wu, Robert E. Williams, Lance C. Pérez

:
Three-dimensional indoor localisation system using radio frequency identification tags. 309-324 - Joyashree Bag, Subhashis Roy

, Bijoy Kantha, Subir Kumar Sarkar:
Advanced multi-step security scheme using PCA for RFID system and its FPGA implementation. 325-341 - Sebastian Wallner, Klaus Finkenzeller:

Secure and interference-robust ISO/IEC 18000-63 compatible UHF-RFID tags by cryptographic authentication primitives. 342-361 - Lvqing Yang, Hang Xu, Wenhua Zeng:

Research of an improved RFID indoor localisation algorithm based on virtual reference tag and error correction mechanism. 362-375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














