Searched for: +
(1 - 7 of 7)
document
Myny, K. (author), Rockelé, M. (author), Chasin, A. (author), Pham, D.V. (author), Steiger, J. (author), Botnaras, S. (author), Weber, D. (author), Herold, B. (author), Ficker, J. (author), Van Putten, B.D. (author), Gelinck, G.H. (author), Genoe, J. (author), Dehaene, W. (author), Heremans, P. (author)
A bidirectional communication protocol allows radio-frequency identification (RFID) tags to have readout of multiple tags in the RF field without collision of data. In this paper, we realized bidirectional communication between a reader system and thin-film RFID tag by introducing a novel protocol for the uplink communication. Amplitude...
article 2014
document
Veugen, P.J.M. (author), Beye, M. (author)
Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an et al. have defined measures for the...
bookPart 2013
document
Alpár, G. (author), Batina, L. (author), Lueks, W. (author)
Recent research has shown that using public-key cryptography in order to meet privacy requirements for RFID tags is not only necessary, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification protocol. This protocol ensures that the identity of a tag only becomes known to...
bookPart 2013
document
Beye, M. (author), Veugen, P.J.M. (author)
Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen [2] devised trees to withstand such attacks, but...
conference paper 2011
document
Holmström, J. (author), Kajosaari, R. (author), Främling, K. (author), Langius, E.A.F. (author), TNO Informatie- en Communicatietechnologie (author)
Item-centric tracking is an opportunity to increase visibility and control in different operations of a company. The economical feasibility of item-centric tracking is based on recent technological developments for monitoring the material flow on the item-level instead of the material type-level. It enables companies to track and trace assets...
article 2009
document
van Deventer, M.O. (author), Brandenburg, N.P. (author), Karagiannis, G. (author), Schenk, M.R. (author), TNO Informatie- en Communicatietechnologie (author)
This is a paper on personalised TV for concurrent use. It was presented at the The 3rd IEEE Workshop on Enabling the Future Service-Oriented Internet - Towards Socially-Aware Networks ("EFSOI 2009"), held in conjunction with IEEE GLOBECOM 2009, Honolulu, HI, USA, December 4, 2009.
report 2009
document
Kajosaari, R. (author), Langius, E. (author), Holmström, J. (author), TNO Informatie- en Communicatietechnologie (author)
Item-centric control and information management is a potential solution to establish economically and practically feasible Concurrent Enterprises. The economical feasibility of item-centric tracking is based on recent technological developments for monitoring the material flow on the item-level instead of the material type-level. Item-centric...
conference paper 2007
Searched for: +
(1 - 7 of 7)