Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains
暂无分享,去创建一个
[1] Hossam Afifi,et al. Scalable privacy protecting scheme through distributed RFID tag identification , 2008, AIPACa '08.
[2] Paolo D'Arco,et al. An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control , 2011, WISTP.
[3] Refik Molva,et al. ROTIV: RFID Ownership Transfer with Issuer Verification , 2010, IACR Cryptol. ePrint Arch..
[4] Sasa Radomirovic,et al. Security of an RFID Protocol for Supply Chains , 2008, 2008 IEEE International Conference on e-Business Engineering.
[5] Serge Vaudenay,et al. Pathchecker: An RFID application for tracing products in Supply-chains , 2015 .
[6] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.
[7] Lingfei Mo,et al. Dual-reader wireless protocols for dense active RFID identification , 2011, Int. J. Commun. Syst..
[8] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[9] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[10] George T. Amariucai,et al. An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID , 2011, RFIDSec.
[11] Chun-Hee Lee,et al. Efficient storage scheme and query processing for supply chain management using RFID , 2008, SIGMOD Conference.
[12] Yanjun Zuo,et al. RFID-Enabled Logistic Flow Tracing in Supply Chains: Communication, Protocol, and Security , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[13] Yanjun Zuo,et al. Survivability Experiment and Attack Characterization for RFID , 2012, IEEE Transactions on Dependable and Secure Computing.
[14] Chunhua Su,et al. RFID mutual authentication protocols with universally composable security , 2011 .
[15] Yanjun Zuo. Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[16] Julien Bringer,et al. Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function , 2008, SCN.
[17] Mohammad Dakhilalian,et al. Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors , 2012, Int. J. Commun. Syst..
[18] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[19] Kaan Yuksel,et al. Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications , 2004 .
[20] Ingrid Verbauwhede,et al. Hierarchical ECC-Based RFID Authentication Protocol , 2011, RFIDSec.
[21] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Jinwoo Park,et al. RFID-based traceability in the supply chain , 2008, Ind. Manag. Data Syst..
[23] Josep Domingo-Ferrer,et al. A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation , 2011, RFIDSec.
[24] Bryan Parno,et al. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.