J
Joan Melià-Seguí
Researcher at Open University of Catalonia
Publications - 39
Citations - 1825
Joan Melià-Seguí is an academic researcher from Open University of Catalonia. The author has contributed to research in topics: Radio-frequency identification & Pseudorandom number generator. The author has an hindex of 14, co-authored 34 publications receiving 1417 citations. Previous affiliations of Joan Melià-Seguí include Pompeu Fabra University & PARC.
Papers
More filters
Journal ArticleDOI
Understanding the Limits of LoRaWAN
Ferran Adelantado,Xavier Vilajosana,Pere Tuset-Peiró,Borja Martinez,Joan Melià-Seguí,Thomas Watteyne +5 more
TL;DR: An impartial and fair overview of the capabilities and limitations of LoRaWAN is provided, which are discussed in the context of use cases, and list open research and development questions.
Journal ArticleDOI
CUIDATS: an RFID–WSN hybrid monitoring system for smart health care environments
TL;DR: CUIDATS is presented, an IoT hybrid monitoring system for health care environments which integrates RFID and WSN technologies in a single platform providing location, status, and tracking of patients and assets.
Journal ArticleDOI
Using augmented reality and Internet of things to improve accessibility of people with motor disabilities in the context of smart cities
TL;DR: A system that enables wheelchair users to interact with items placed beyond their arm’s length, with the help of Augmented Reality (AR) and Radio Frequency Identification (RFID) technologies is developed, providing an opportunity for equality improvement.
Journal ArticleDOI
J3Gen: a PRNG for low-cost passive RFID.
TL;DR: J3Gen successfully handles the inherent linearity of LFSR based PRNGs and satisfies the statistical requirements imposed by the EPC Gen2 standard.
Book ChapterDOI
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags
TL;DR: This work analyzes a recent proposal presented in the literature and demonstrates that it is insecure, and proposes an alternative mechanism that fits the Gen2 constraints and satisfies the security requirements.