Learn More
Authentication has an important role in many RFID applications for providing security and privacy. In this paper we focus on investigating how RFID can be used in product authentication in supply chain applications and a review of existing approaches is provided. The different categories of RFID product authentication approaches are analyzed within the(More)
Social networks have become an additional marketing channel that could be integrated with the traditional ones as a part of the marketing mix. The change in the dynamics of the marketing interchange between companies and consumers as introduced by social networks has placed a focus on the non-transactional customer behavior. In this new marketing era, the(More)
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The security community and the RFID chip manufacturers are currently focused on the former by making tags hard to clone. This paper focuses on the latter by investigating a method to pinpoint(More)
The adoption and diffusion of RFID technology take longer time than it was expected years ago. While few industries adopted RFID right away others are reluctant and took up a 'wait and see' position. Especially standards play a major role. Even standards are available today, many industries announced additional requirements for their specific processes. As(More)
This paper presents a concept that enables consumers to access and share product recommendations using their mobile phone. Based on a review of current product recommendation mechanisms it devises a concept called APriori. APriori leverages the potential of auto-ID-enabled mobile phones (barcode/RFID) to receive and submit product ratings. Since mobile(More)
The EPC Network is a global RFID data sharing infrastructure based on standards that are built around the Electronic Product Code (EPC), an unambiguous numbering scheme for the designation of physical goods. The authors present the fundamental concepts and applications of the EPC Network, its integration with enterprise systems, and its functionality for(More)
We evaluate a mobile application that assesses driving behavior based on in-vehicle acceleration measurements and gives corresponding feedback to drivers. In the insurance business, such applications have recently gained traction as a viable alternative to the monitoring of drivers via "black boxes" installed in vehicles, which lacks interaction(More)
In this paper we investigate on the potential of combining social and technical networks to collaboratively provide services to both human users and technical systems. In the Internet of Things (IoT), things talk and exchange information to realize the vision of future pervasive computing environments. The common physical and social space emerges by the(More)