Computational model for trust management in RFID supply chains
暂无分享,去创建一个
[1] Vijay Varadharajan,et al. A Hybrid Trust Model for Enhancing Security in Distributed Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[2] Mohammad Zulkernine,et al. A Trust Framework for Pervasive Computing Environments , 2006, IEEE International Conference on Computer Systems and Applications, 2006..
[3] Yunwei Xin,et al. A Trust Framework for Pervasive Computing Environments , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[4] Jian Huang,et al. An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[5] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[6] Xue Li,et al. RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.
[7] Zhibin Zhou,et al. RFID Keeper: An RFID Data Access Control Mechanism , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[8] Dong Hoon Lee,et al. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.
[9] S. H. Choi,et al. An RFID-based Anti-counterfeiting System , 2008 .
[10] Florian Michahelles,et al. Trust and Security in RFID-Based Product Authentication Systems , 2007, IEEE Systems Journal.
[11] Lea Kutvonen,et al. Trust Management Survey , 2005, iTrust.
[12] Mikko Lehtonen,et al. From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .
[13] Mike Burmester,et al. RFID Security : Attacks , Countermeasures and Challenges , 2007 .
[14] Manmeet Mahinderjit Singh,et al. Trust Framework for RFID Tracking in Supply Chain Management , 2009, IWRT.
[15] Dong Seong Kim,et al. Access Control and Authorization for Security of RFID Multi-Domain Using SAML and XACML , 2006, 2006 International Conference on Computational Intelligence and Security.
[16] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[17] Damith C. Ranasinghe,et al. EPC Network Architecture , 2008 .