PUF-based Smart Tags for Supply Chain Management
暂无分享,去创建一个
[1] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[2] Xiang Li,et al. DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains , 2017, IEEE Transactions on Emerging Topics in Computing.
[3] Zhang Zhe,et al. A review on consensus algorithm of blockchain , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[4] J. Fuhr,et al. The health and economic effects of counterfeit drugs. , 2014, American health & drug benefits.
[5] Iwao Sasase,et al. A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain , 2017, IEEE Access.
[6] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[7] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[8] Hovav Shacham,et al. When private keys are public: results from the 2008 Debian OpenSSL vulnerability , 2009, IMC '09.
[9] Sanjiv Kumar,et al. Analysis of Vulnerabilities in Radio Frequency Identification (RFID) Systems , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[10] Martin von Haller Grønbæk. Blockchain 2.0, smart contracts and challenges , 2016 .
[11] Sabu Emmanuel,et al. Machine Learning Approaches in Cyber Security Analytics , 2019 .
[12] Sabu Emmanuel,et al. Neural Networks and Face Recognition , 2020 .
[13] Nir Kshetri,et al. 1 Blockchain's roles in meeting key supply chain management objectives , 2018, Int. J. Inf. Manag..
[14] Nirupama Bulusu,et al. Block-Supply Chain: A New Anti-Counterfeiting Supply Chain Using NFC and Blockchain , 2018, CRYBLOCK@MobiSys.
[15] Dejan Vujičić,et al. Blockchain technology, bitcoin, and Ethereum: A brief overview , 2018, 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH).
[16] Davor Dujak,et al. Blockchain Applications in Supply Chain , 2018, SMART Supply Network.
[17] Kazumaro Aoki,et al. SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .
[18] Bryan T Horvath. Not All Parts Are Created Equal: The Impact Of Counterfeit Parts In The Air Force Supply Chain , 2017 .
[19] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[20] Basel Halak. Physically Unclonable Functions: Design Principles and Evaluation Metrics , 2018 .
[21] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[22] Basel Halak. Security Attacks on Physically Unclonable Functions and Possible Countermeasures , 2018 .
[23] Hung-Min Sun,et al. A Blockchain-Based Application System for Product Anti-Counterfeiting , 2020, IEEE Access.
[24] Debdeep Mukhopadhyay,et al. A PUF-Based Secure Communication Protocol for IoT , 2017, IACR Cryptol. ePrint Arch..
[25] François-Xavier Standaert,et al. A Tutorial on Physical Security and Side-Channel Attacks , 2004, FOSAD.