Scalable Data Access Control in RFID-Enabled Supply Chain
暂无分享,去创建一个
Yunhao Liu | Mo Li | Yuanqing Zheng | Saiyu Qi | Jinli Qiu | Yunhao Liu | Mo Li | Yuanqing Zheng | Saiyu Qi | Jinli Qiu
[1] Refik Molva,et al. Tracker: Security and Privacy for RFID-based Supply Chains , 2010, NDSS.
[2] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[3] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.
[5] AtenieseGiuseppe,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006 .
[6] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[7] Keisuke Tanaka,et al. Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 , 2013, CT-RSA.
[8] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[9] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[10] Dan Boneh,et al. Efficient Selective Identity-Based Encryption Without Random Oracles , 2011, Journal of Cryptology.
[11] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[12] Refik Molva,et al. CHECKER: on-site checking in RFID-based supply chains , 2012, WISEC '12.
[13] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[14] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[15] Srdjan Capkun,et al. Tailing RFID Tags for Clone Detection , 2013, NDSS.
[16] Florian Kerschbaum,et al. RFID-based supply chain partner authentication and key agreement , 2009, WiSec '09.
[17] Krishna P. Gummadi,et al. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.
[18] Deborah Catalano Ruriani. PHARMA LOGISTICS: CAN RFID HEAL SUPPLY CHAIN SECURITY? , 2004 .
[19] Ralf W. Seifert,et al. Applications of RFID in Supply Chains , 2007 .
[20] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[21] Matthew Green,et al. Self-Protecting Electronic Medical Records Using Attribute-Based Encryption , 2010, IACR Cryptol. ePrint Arch..
[22] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[23] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).