메뉴 건너뛰기




Volumn 3802 LNAI, Issue , 2005, Pages 273-278

Tamper detection for ubiquitous RFID-enabled supply chain

Author keywords

[No Author keywords available]

Indexed keywords

DATA TAMPERING; SUPPLY CHAIN; TAMPER DETECTION;

EID: 33646841032     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11596981_40     Document Type: Conference Paper
Times cited : (11)

References (9)
  • 1
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • CCS, ACM Press
    • Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Conference on Computer and Communications Security - CCS, ACM Press, (2004) 210-219
    • (2004) Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 3
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • D. Hutter et al. (eds.): Springer-Verlag, Berlin Heidelberg New York
    • Weis, S., A., Sarma, S., E., Rivest, R., L., Engels, D., W.: Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems. In D. Hutter et al. (eds.): Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802. Springer-Verlag, Berlin Heidelberg New York (2003) 201-212.
    • (2003) Security in Pervasive Computing, Lecture Notes in Computer Science , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 4
    • 84858872947 scopus 로고    scopus 로고
    • RFID's security challenge- Security and its high cost appears to be the next hurdle in the widespread adoption of RFID
    • Nov. 15
    • Claburn, T., Hulme, G., V.: RFID's Security Challenge- Security and its high cost appears to be the next hurdle in the widespread adoption of RFID. In InformationWeek, Accessed onNov. 15, 2004 URL: http://www.informationweek.com/ story/showArticle.jhtml?articleID=52601030
    • (2004) InformationWeek, Accessed on
    • Claburn, T.1    Hulme, G.V.2
  • 5
    • 84858876342 scopus 로고    scopus 로고
    • "Relational Check Code" Awaiting US Patent
    • Kevin Chung, "Relational Check Code" Awaiting US Patent.
    • Chung, K.1
  • 6
    • 84858867537 scopus 로고    scopus 로고
    • AES and SHA-1 Crypto-processor Cores
    • CAST Inc. AES and SHA-1 Crypto-processor Cores http://www.cast-inc.com/ index.shtml
  • 9
    • 35048847641 scopus 로고    scopus 로고
    • Tackling security and privacy issues in radio fre-quency identification devices
    • A. Ferscha and F. Mattern (eds.): PERVASIVE 2004, Springer-Verlag, Berlin Heidelberg New York
    • Henrici, D., Müller, P.: Tackling Security and Privacy Issues in Radio Fre-quency Identification Devices. In A. Ferscha and F. Mattern (eds.): PERVASIVE 2004, Lecture Notes in Computer Science, Vol. 3001. Springer-Verlag, Berlin Heidelberg New York (2004) 219-224.
    • (2004) Lecture Notes in Computer Science , vol.3001 , pp. 219-224
    • Henrici, D.1    Müller, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.