<p><span>Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localizat
RFID Protocol Design, Optimization and Security for the Internet of Things
β Scribed by Alex X. Liu, Keqiu Li, Muhammad Shahzad, Xiulong Liu
- Publisher
- IET
- Year
- 2017
- Tongue
- English
- Leaves
- 262
- Category
- Library
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves. An RFID tag contains an antenna and a microchip that allows it to transmit and receive. This technology is a possibl
RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves.<br>An RFID tag contains an antenna and a microchip that allows it to transmit and receive. This technology is a possi
<p>This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable t
<p>Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an incre