A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain
暂无分享,去创建一个
Iwao Sasase | P. Takis Mathiopoulos | Tomoaki Ohtsuki | Kentaroh Toyoda | I. Sasase | T. Ohtsuki | Kentaroh Toyoda | P. Mathiopoulos
[1] Xiang Li,et al. DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains , 2017, IEEE Transactions on Emerging Topics in Computing.
[2] Davide Zanetti,et al. Privacy-preserving clone detection for RFID-enabled supply chains , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).
[3] Refik Molva,et al. Tracker: Security and Privacy for RFID-based Supply Chains , 2010, NDSS.
[4] Michel Barbeau,et al. Proactive Threshold Cryptosystem for EPC Tags , 2011, Ad Hoc Sens. Wirel. Networks.
[5] Robert H. Deng,et al. Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains , 2009, ICICS.
[6] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[7] Bryan Parno,et al. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.
[8] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[9] Marc Langheinrich,et al. Practical Minimalist Cryptography for RFID Privacy , 2007, IEEE Systems Journal.
[10] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[11] Refik Molva,et al. CHECKER: on-site checking in RFID-based supply chains , 2012, WISEC '12.
[12] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[13] Tim Howes,et al. Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2 , 1999, RFC.
[14] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[15] Frédéric Thiesse,et al. Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] Colin D. Walter,et al. An NFC based consumer-level counterfeit detection framework , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[18] Srdjan Capkun,et al. Tailing RFID Tags for Clone Detection , 2013, NDSS.
[19] Iwao Sasase,et al. Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains , 2015, 2015 IEEE International Conference on RFID (RFID).
[20] M. Rosenfeld. Overview of Colored Coins , 2013 .
[21] Xiaoqi Jia,et al. An Efficient Group-Based Secret Sharing Scheme , 2011, ISPEC.
[22] Yingjiu Li,et al. Batch Clone Detection in RFID-enabled supply chain , 2014, 2014 IEEE International Conference on RFID (IEEE RFID).