[КНИГА][B] Enabling Things to Talk: Designing IoT Solutions with TheIoT Architectural Reference Model

A Bassi, M Bauer, M Fiedler, T Kramp… - 2013 - library.oapen.org
Information Systems Applications (incl. Internet); Business IT Infrastructure; Computer Appl.
in Administrative Data Processing; Operations Management; Software Engineering; Special …

How to monitor for missing RFID tags

CC Tan, B Sheng, Q Li - 2008 The 28th International …, 2008 - ieeexplore.ieee.org
As RFID tags become more widespread, new approaches for managing larger numbers of
RFID tags will be needed. In this paper, we consider the problem of how to accurately and …

User interface prototy**-concepts, tools, and experience

D Baumer, W Bischofberger, H Lichter… - Proceedings of IEEE …, 1996 - ieeexplore.ieee.org
In recent years the development of highly interactive software systems with graphical user
interfaces has become increasingly common. The acceptance of such a system depends to …

Provably secure grou**-proofs for RFID tags

M Burmester, B de Medeiros, R Motta - International Conference on Smart …, 2008 - Springer
We investigate an application of RFIDs referred to in the literature as group scanning, in
which several tags are “simultaneously” scanned by a reader device. Our goal is to study the …

Flaws on RFID grou**-proofs. Guidelines for future sound protocols

P Peris-Lopez, A Orfila, JC Hernandez-Castro… - Journal of Network and …, 2011 - Elsevier
During the last years many RFID authentication protocols have been proposed with major or
minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different …

ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grou**-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment

S Majumder, S Ray, D Sadhukhan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the
Internet of Things (IoT) network due to its autonomous data collection as well as transfer …

Efficient techniques for monitoring missing RFID tags

CC Tan, B Sheng, Q Li - IEEE Transactions on Wireless …, 2010 - ieeexplore.ieee.org
As RFID tags become more widespread, new approaches for managing larger numbers of
RFID tags will be needed. In this paper, we consider the problem of how to accurately and …

[PDF][PDF] Internet of things-architecture iot-a deliverable d1. 5-final architectural reference model for the iot v3. 0

J De Loof, CM SAP, S Meissner, A Nettsträter… - IoT-A …, 2013 - researchgate.net
A commonly observed trend in the field of the Internet of Things (IoT) is the emergence of a
variety of communication solutions targeted at specific application domains. Many …

Simulation and cost analysis of group authentication protocols

A Kumar, K Gopal, A Aggarwal - 2016 Ninth International …, 2016 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking
and group proof construction. The multi-round protocols for authentication and group proof …

Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)

A Kumar, K Gopal, A Aggarwal - 2014 International Conference …, 2014 - ieeexplore.ieee.org
Things are integrated for increasing the availability of information. MIoT is the connectivity of
mobile devices to extend the information. Connectivity of mobile devices helps in managing …