Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard |
MohammadHassan Habibi1, Mahmud Gardeshi1 and Mahdi R. Alaghband2, 1I.H University, Iran and 2Islamic Azad University, Iran |
Volume : 2 volume number : 1 pdf |
Information Selection and Delivery Algorithm for Delivering Advertisements Suitable for the Pedestrians Present at a Particular Site |
Koichi Matsuoka, Nobuo Katou, Shigeo Dejima and Kazumasa Takami, Soka University, Japan |
Volume : 2 volume number : 1 pdf |
CDTOM: A Context-driven Task-oriented Middleware for Pervasive Homecare Environment |
Hongbo Ni1,2, Bessam Abdulrazak2, Daqing Zhang3 and Shu Wu2, 1Northwestern Polytechnic University, China, 2University of Sherbrooke, Canada and 3Institut Telecom SudParis, France |
Volume : 2 volume number : 1 pdf |