Low-Cost RFID Identification Variation
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However,...
| Main Authors: | Lin, K., Yeh, T., Liu, Y., Lin, Chad |
|---|---|
| Other Authors: | Cheng, H.D. |
| Format: | Conference Paper |
| Published: |
Atlantis Press
2006
|
| Subjects: | |
| Online Access: | http://www.atlantis-press.com:80/ http://hdl.handle.net/20.500.11937/45028 |
Similar Items
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Spatial and Temporal Analysis on the Distribution of Active Radio-Frequency Identification (RFID) Tracking Accuracy with the Kriging Method
by: Liu, Xin, et al.
Published: (2014)
by: Liu, Xin, et al.
Published: (2014)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Radio frequency identification (RFID) adoption: a cross-sectional comparison of voluntary and mandatory contexts
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
Antecedents of Continuance Intention of RFID Technology in Western Australian Farms
by: Hossain, Mohammad, et al.
Published: (2012)
by: Hossain, Mohammad, et al.
Published: (2012)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Breach with Intent: A Risk Analysis of Deliberate Security Breaches in the Seafood Supply Chain
by: Forbes, David, et al.
Published: (2015)
by: Forbes, David, et al.
Published: (2015)
Passive RFID tag for biomass tracking and monitoring
of temperature and humidity level
by: Ali, Amjad
Published: (2024)
by: Ali, Amjad
Published: (2024)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Impact of External Environmental Factors on RFID Adoption in Australian Livestock Industry: An Exploratory Study
by: Hossain, M., et al.
Published: (2010)
by: Hossain, M., et al.
Published: (2010)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Does Mandatory Pressure Increase RFID Adoption? A Case Study of Western Australian Livestock Industry
by: Hossain, Mohammad, et al.
Published: (2013)
by: Hossain, Mohammad, et al.
Published: (2013)
Developing and validating a model explaining the assimilation process of RFID: An empirical study.
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Developing and validating a hierarchical model of external responsiveness: A study on RFID technology
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Autonomous robot navigation and path following via
RFID tag detection
by: Castle-Green, Simon
Published: (2017)
by: Castle-Green, Simon
Published: (2017)
Understanding smartphone users' awareness of security and privacy in downloading third-party applications - A survey in UK and Japan
by: Kawakubo, Noriko
Published: (2013)
by: Kawakubo, Noriko
Published: (2013)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Guaranteed-cost controls of minimal variation: A numerical algorithm based on control parameterization
by: Loxton, Ryan, et al.
Published: (2014)
by: Loxton, Ryan, et al.
Published: (2014)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Adoption, continued, and extended use of radio frequency identification (RFID) technology : Australian Livestock Industry
by: Mohammad Alamgir, Hossain
Published: (2012)
by: Mohammad Alamgir, Hossain
Published: (2012)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A generic privacy ontology and its applications to different domains
by: Hecker, Michael
Published: (2009)
by: Hecker, Michael
Published: (2009)
Evaluation of Radio Frequency Identification (RFID) technology as a tracking instrument in the supply chain of pharmaceutical products with a case study at ZLB Behring GmbH
by: Fischer, Thorsten
Published: (2005)
by: Fischer, Thorsten
Published: (2005)
Reporting and understanding the safety and adverse effect profile of mobile apps for psychosocial interventions: An update
by: Naeem, Farooq, et al.
Published: (2016)
by: Naeem, Farooq, et al.
Published: (2016)
Similar Items
-
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008) -
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006) -
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008) -
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Spatial and Temporal Analysis on the Distribution of Active Radio-Frequency Identification (RFID) Tracking Accuracy with the Kriging Method
by: Liu, Xin, et al.
Published: (2014)