Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,371,598 papers from all fields of science
Search
Sign In
Create Free Account
Mobile RFID
Known as:
M-rfid
Mobile RFID (M-RFID) can be defined as services that provide information on objects equipped with an RFID tag over a telecommunication network.”. The…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Electronic Product Code
Mobile phone
Broader (1)
Radio-frequency identification
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
OTrack: Towards Order Tracking for Tags in Mobile RFID Systems
Longfei Shangguan
,
Zhenjiang Li
,
Zheng Yang
,
Mo Li
,
Yunhao Liu
,
Jinsong Han
IEEE Transactions on Parallel and Distributed…
2014
Corpus ID: 2489195
In many logistics applications of RFID technology, luggage attached with tags are placed on moving conveyor belts for processing…
Expand
Highly Cited
2011
Highly Cited
2011
Implementation of terminal middleware platform for mobile RFID computing
Namje Park
International Journal of Ad Hoc and Ubiquitous…
2011
Corpus ID: 13639317
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or…
Expand
2011
2011
Towards RFID traceability systems of farmed fish supply chain
Mira Trebar
,
Andrej Grah
,
Alejandro Álvarez Melcón
,
Alfredo Parreno
SoftCOM , 19th International Conference on…
2011
Corpus ID: 14624544
In the project “RFID from Farm to Fork” an implementation of RFID technologies will be used along the food supply chain: from…
Expand
Highly Cited
2010
Highly Cited
2010
The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader
Namje Park
2010
Corpus ID: 220948990
The current excessive limitations to mobile RFID tags and readers make it impossible to apply present codes and protocols. The…
Expand
Review
2010
Review
2010
Survivable RFID Systems: Issues, Challenges, and Techniques
Yanjun Zuo
IEEE Transactions on Systems Man and Cybernetics…
2010
Corpus ID: 41228153
Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national…
Expand
Highly Cited
2008
Highly Cited
2008
A study on secure RFID mutual authentication scheme in pervasive computing environment
Sooyoung Kang
,
Deok-Gyu Lee
,
Imyeong Lee
Computer Communications
2008
Corpus ID: 2497889
2006
2006
Security Vulnerability and Considerations in Mobile RFID environment
Ju-Han Kim
,
Howon Kim
8th International Conference Advanced…
2006
Corpus ID: 45866171
In this paper, we present some cases which raise security vulnerability in the forthcoming mobile RFID environment and discuss…
Expand
2006
2006
Product Authentication Service of Consumer's mobile RFID Device
Ju-Han Kim
,
Dooho Choi
,
Inseop Kim
,
Howon Kim
IEEE International Symposium on Consumer…
2006
Corpus ID: 22239818
We propose a product authentication service which is anti-counterfeiting technology and can be applied to both the supply chain…
Expand
2005
2005
Mobile RFID technology for improving m-commerce
Weiping Zhu
,
Dong Wang
,
H. Sheng
IEEE International Conference on e-Business…
2005
Corpus ID: 22579434
The RFID technology is called a revolution to our life in new century. This paper introduces how to improve m-commerce utilizing…
Expand
2005
2005
Mobile RFID reader with database wireless synchronization
S. Sandoval-Reyes
,
J.L. Soberanes Perez
International Conference on Electrical and…
2005
Corpus ID: 37836170
Using radio scanners to wirelessly identify consumer is not too complex in reality. The current form of this technology known as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE