Search
Now showing items 1-5 of 5
Energy Efficient Tag Estimation Method for ALOHA-Based RFID Systems
Publisher: IEEE
Year: 2014
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks
Publisher: IEEE
Year: 2014
Performance Analysis of RFID Protocols: CDMA Versus the Standard EPC Gen-2
Publisher: IEEE
Year: 2014
Design of anti-collision integrated security mechanism based on chaotic sequence in UHF RFID system
Publisher: IEEE
Year: 2014