Ten papers describe tag identification protocols in RFID systems, identify security weaknesses, and share applications combining automatic identification with sensor capabilities. The researchers explore grouping proofs, the feasibility of elliptic curve cryptography on wireless identification and sensing platforms (WISP), minimal instruction set computer (MISC) processor design, patient compliance monitoring for home telecare, and different approaches to tracking the supply chain of consumer food products. B&w diagrams are provided.
– Book News Inc. Portland, OR