Author:
Visuwasam L. Maria Michael,Dhinakaran K.,Kalpana G.,Balakrishna Ashwin,Kowsalyaa V.,Nikitha Keerthana S. R.
Publisher
Springer Nature Singapore
Reference16 articles.
1. Ray BR, Chowdhury M, Abawajy J (2013) Critical analysis and comparative study of security for networked RFID systems. In: 2013 14th ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). Honolulu, HI, pp 197–202
2. EPCglobe. EPC Radio-frequency identify protocols generation-2 UHF RFID specification for RFID air interface protocol for communication at 860 MHz–960 MHz version 2.0.0 ratified, November 2013. Available online at http://www.gs1.org
3. Boneh D, Lynn B, Shacham H (2001) Short signature from the weil pairing. Proc Asia Crypt, LNCS 2248:514–532
4. Elkiyaoui K, Blass E-O, Molva R (2012) CHECKER: on-site checking in RFID-based supply chains, paper presented to proceedings of the fifth ACM conference on security and privacy in wireless and mobile networks. Tucson, Arizona, USA
5. Pasic F, Wohlers B, Dziwok S, Becker M, Heinrich M (2019) A KPI-based condition monitoring system for the beer brewing process. In: 2019 24th IEEE international conference on emerging technologies and factory automation (ETFA). Zaragoza, Spain, pp 1469–14