
RFID Applications
This book introduces current efficient and secure backscatter networking schemes for RFID. The authors integrate these schemes with a concrete example, namely RFID-based missing item detection. The book presents a large palette of tools indispensable in the RFID-based passive IoT (such as compute complexity analysis, approximate algorithm design, the probabilistic data structure, and the protocol ...
This book introduces current efficient and secure backscatter networking schemes for RFID. The authors integrate these schemes with a concrete example, namely RFID-based missing item detection. The book presents a large palette of tools indispensable in the RFID-based passive IoT (such as compute complexity analysis, approximate algorithm design, the probabilistic data structure, and the protocol ...