Author of the publication

RFID Systems and Security and Privacy Implications.

, , and . CHES, volume 2523 of Lecture Notes in Computer Science, page 454-469. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toolpath generation along directions of maximum kinematic performance; a first cut at machine-optimal paths., and . Computer-Aided Design, 34 (6): 453-468 (2002)Real-time interference analysis between a tool and an environment., , and . Computer-Aided Design, 33 (13): 935-947 (2001)Stable arrangements of mobile sensors for sampling physical fields., , and . ACC, page 324-331. IEEE, (2012)RFIDSim - A Physical and Logical Layer Simulation Engine for Passive RFID., and . IEEE Trans. Automation Science and Engineering, 6 (1): 33-43 (2009)Optimal sweeping paths on a 2-manifold: a new class of optimization problems defined by path structures., and . IEEE Trans. Robotics and Automation, 19 (4): 613-636 (2003)UHF RFID tag IC power mode switching for wireless sensing of resistive and electrochemical transduction modalities., , and . RFID, page 1-8. IEEE, (2018)Can small smart swappable battery EVs outperform gas powertrain economics?, , and . ITSC, page 1-6. IEEE, (2017)Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems., , , and . SPC, volume 2802 of Lecture Notes in Computer Science, page 201-212. Springer, (2003)A Pseudopolynomial Time O (log n )-Approximation Algorithm for Art Gallery Problems., , , and . WADS, volume 4619 of Lecture Notes in Computer Science, page 163-174. Springer, (2007)Colorwave: a MAC for RFID reader networks., , and . WCNC, page 1701-1704. IEEE, (2003)