[PDF][PDF] A survey of RFID deployment and security issues

A Grover, H Berghel - Journal of information processing systems, 2011 - koreascience.kr
This paper describes different aspects of a typical RFID implementation. Section 1 provides
a brief overview of the concept of Automatic Identification and compares the use of different …

A study on intelligent user‐centric logistics service model using ontology

S Sivamani, K Kwak, Y Cho - Journal of Applied Mathematics, 2014 - Wiley Online Library
Much research has been undergone in the smart logistics environment for the prompt
delivery of the product in the right place at the right time. Most of the services were based on …

Provable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptography

Y Zhang, MK Khan, J Chen, D He - Mathematical Problems in …, 2015 - Wiley Online Library
Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation
has been extending and expanding by many scholars. In pervasive computing application …

Related-key cryptanalysis on the full PRINTcipher suitable for IC-printing

Y Lee, K Jeong, C Lee, J Sung… - International Journal of …, 2014 - journals.sagepub.com
PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the
80/160-bit secret keys, respectively. In this paper, we propose related-key cryptanalysis of …

A study of smart power control algorithm using RF communication in smart home environment

S Shin, K Do, B Koh - International Journal of Distributed …, 2013 - journals.sagepub.com
Today's technologies in the IT area face the era of combination and convergence of
technologies in many different areas. Through the natural interaction between people and …

[PDF][PDF] Big Brother: A Road Map for Building Ubiquitous Surveillance System in Nigeria

SE Yusuf, O Osagbemi - … Journal of Advanced Computer Science and …, 2010 - Citeseer
In this paper, we propose a method to improve the security challenges in Nigeria by
embedding literally hundreds of invisible computers into the environment with each …