메뉴 건너뛰기




Volumn 5, Issue 2-3, 2010, Pages 96-105

Trust in RFID-enabled supply-chain management

Author keywords

Authentication; Radio frequency identification; RFID; SCM; Security; Supply chain management; Trust

Indexed keywords

AUTHENTICATION; CLONE CELLS; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 77949713025     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2010.032208     Document Type: Article
Times cited : (16)

References (31)
  • 5
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • September
    • Dimitriou, T. (2005) 'A lightweight RFID protocol to protect against traceability and cloning attacks', Proceedings of SecureComm'05, September, pp.59-66.
    • (2005) Proceedings of SecureComm'05 , pp. 59-66
    • Dimitriou, T.1
  • 7
    • 43749090660 scopus 로고    scopus 로고
    • Consumer acceptance of RFID technology: An exploratory study
    • February
    • Hossain, M. and Prybutok, V. (2008) 'Consumer acceptance of RFID technology: an exploratory study', IEEE Transactions on Engineering Management, Vol.55, No.2, February, pp.316-328.
    • (2008) IEEE Transactions on Engineering Management , vol.55 , Issue.2 , pp. 316-328
    • Hossain, M.1    Prybutok, V.2
  • 8
    • 33645230759 scopus 로고    scopus 로고
    • An anticounterfeiting strategy using numeric tokens
    • Johnston, R.G. (2005) 'An anticounterfeiting strategy using numeric tokens', International Journal of Pharmaceutical Medicine, Vol.19, No.3, pp.163-171.
    • (2005) International Journal of Pharmaceutical Medicine , vol.19 , Issue.3 , pp. 163-171
    • Johnston, R.G.1
  • 9
    • 33749028998 scopus 로고    scopus 로고
    • Strengthening EPC tags against cloning
    • Cologne, Germany
    • Juels, A. (2005) 'Strengthening EPC tags against cloning', Proc. 4th ACM Workshop on Wireless Security, Cologne, Germany, pp.67-76.
    • (2005) Proc. 4th ACM Workshop on Wireless Security , pp. 67-76
    • Juels, A.1
  • 10
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • February
    • Juels, A. (2006) 'RFID security and privacy: a research survey', IEEE Journal on Selected Areas in Communications, Vol.24, No.2, February, pp.381-394.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 16
    • 85008045069 scopus 로고    scopus 로고
    • Trust and security in RFID-based product authentication systems
    • Lehtonen, M., Michahelles, F. and Fleisch, E. (2008a) 'Trust and security in RFID-based product authentication systems', IEEE Systems Journal, Vol.1, No.2, pp.129-144.
    • (2008) IEEE Systems Journal , vol.1 , Issue.2 , pp. 129-144
    • Lehtonen, M.1    Michahelles, F.2    Fleisch, E.3
  • 19
    • 62349115019 scopus 로고    scopus 로고
    • Privacy for RFID systems to prevent tracking and cloning
    • January
    • Mitra, M. (2008) 'Privacy for RFID systems to prevent tracking and cloning', IJCSNS International Journal of Computer Science and Network Security, Vol.8, No.1, January, pp.1-5. Mo, P.T., Sheng, Q.Z., Li, X. and Zeadally, S. (2009)
    • (2008) IJCSNS International Journal of Computer Science and Network Security , vol.8 , Issue.1 , pp. 1-5
    • Mitra, M.1
  • 20
    • 60549098472 scopus 로고    scopus 로고
    • RFID infrastructure design: A case study of two Australian RFID projects
    • January-February
    • Mo, P.T., Sheng, Q.Z., Li, X. and Zeadally, S. (2009) 'RFID infrastructure design: a case study of two Australian RFID projects', IEEE Internet Computing, Vol. 13, No. 1, January-February, pp.14-21.
    • (2009) IEEE Internet Computing , vol.13 , Issue.1 , pp. 14-21
    • Mo, P.T.1    Sheng, Q.Z.2    Li, X.3    Zeadally, S.4
  • 24
    • 84893081352 scopus 로고    scopus 로고
    • Reverse-engineering a cryptographic RFID tag
    • USENIX Association, July, San Jose, CA
    • Nohl, K., Evans, D. and Plotz, H. (2008) 'Reverse-engineering a cryptographic RFID tag', Proc. USENIX Security Symposium, USENIX Association, July, San Jose, CA, pp.185-194.
    • (2008) Proc USENIX Security Symposium , pp. 185-194
    • Nohl, K.1    Evans, D.2    Plotz, H.3
  • 26
    • 24944461245 scopus 로고    scopus 로고
    • Trust management survey
    • Herrmann, P., Issarny, V. and Shiu, S. (Eds.), iTrust 2005, Springer-Verlag
    • Ruohomaa, S. and Kutvonen, L. (2005) 'Trust management survey', in Herrmann, P., Issarny, V. and Shiu, S. (Eds.): iTrust 2005, LNCS 3477, Springer-Verlag, pp.77-92.
    • (2005) LNCS 3477 , pp. 77-92
    • Ruohomaa, S.1    Kutvonen, L.2
  • 27
    • 52449127948 scopus 로고    scopus 로고
    • Enabling next-generation RFID applications: Solutions and challenges
    • Sheng, Q.Z., Li, X. and Zeadally, S. (2008) 'Enabling next-generation RFID applications: solutions and challenges', Computer (IEEE), Vol.41, No.9, pp.22-29.
    • (2008) Computer (IEEE) , vol.41 , Issue.9 , pp. 22-29
    • Sheng, Q.Z.1    Li, X.2    Zeadally, S.3
  • 28
    • 33644541758 scopus 로고    scopus 로고
    • Extending the EPC network: The potential of RFID in anti-counterfeiting
    • Santa Fe, New Mexico
    • Staake, T., Thiesse, F. and Fleisch, E. (2005) 'Extending the EPC network: the potential of RFID in anti-counterfeiting', Proc. ACM Symposium on Applied Computing, Santa Fe, New Mexico, pp.1607-1612.
    • (2005) Proc ACM Symposium on Applied Computing , pp. 1607-1612
    • Staake, T.1    Thiesse, F.2    Fleisch, E.3
  • 29
    • 33750845011 scopus 로고    scopus 로고
    • A trust framework for pervasive computing environments
    • 8 March
    • Wolfe, S.T. and Ahamed, S.I. (2006) 'A trust framework for pervasive computing environments', IEEE, Computer Systems and Applications, 8 March, pp.312-319.
    • (2006) IEEE, Computer Systems and Applications , pp. 312-319
    • Wolfe, S.T.1    Ahamed, S.I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.