Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[КНИГА][B] Enabling Things to Talk: Designing IoT Solutions with TheIoT Architectural Reference Model
Information Systems Applications (incl. Internet); Business IT Infrastructure; Computer Appl.
in Administrative Data Processing; Operations Management; Software Engineering; Special …
in Administrative Data Processing; Operations Management; Software Engineering; Special …
How to monitor for missing RFID tags
As RFID tags become more widespread, new approaches for managing larger numbers of
RFID tags will be needed. In this paper, we consider the problem of how to accurately and …
RFID tags will be needed. In this paper, we consider the problem of how to accurately and …
User interface prototy**-concepts, tools, and experience
D Baumer, W Bischofberger, H Lichter… - Proceedings of IEEE …, 1996 - ieeexplore.ieee.org
In recent years the development of highly interactive software systems with graphical user
interfaces has become increasingly common. The acceptance of such a system depends to …
interfaces has become increasingly common. The acceptance of such a system depends to …
Provably secure grou**-proofs for RFID tags
We investigate an application of RFIDs referred to in the literature as group scanning, in
which several tags are “simultaneously” scanned by a reader device. Our goal is to study the …
which several tags are “simultaneously” scanned by a reader device. Our goal is to study the …
Flaws on RFID grou**-proofs. Guidelines for future sound protocols
During the last years many RFID authentication protocols have been proposed with major or
minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different …
minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different …
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grou**-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment
Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the
Internet of Things (IoT) network due to its autonomous data collection as well as transfer …
Internet of Things (IoT) network due to its autonomous data collection as well as transfer …
Efficient techniques for monitoring missing RFID tags
As RFID tags become more widespread, new approaches for managing larger numbers of
RFID tags will be needed. In this paper, we consider the problem of how to accurately and …
RFID tags will be needed. In this paper, we consider the problem of how to accurately and …
[PDF][PDF] Internet of things-architecture iot-a deliverable d1. 5-final architectural reference model for the iot v3. 0
J De Loof, CM SAP, S Meissner, A Nettsträter… - IoT-A …, 2013 - researchgate.net
A commonly observed trend in the field of the Internet of Things (IoT) is the emergence of a
variety of communication solutions targeted at specific application domains. Many …
variety of communication solutions targeted at specific application domains. Many …
Simulation and cost analysis of group authentication protocols
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking
and group proof construction. The multi-round protocols for authentication and group proof …
and group proof construction. The multi-round protocols for authentication and group proof …
Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)
Things are integrated for increasing the availability of information. MIoT is the connectivity of
mobile devices to extend the information. Connectivity of mobile devices helps in managing …
mobile devices to extend the information. Connectivity of mobile devices helps in managing …