메뉴 건너뛰기




Volumn , Issue , 2010, Pages 37-44

Privacy-preserving clone detection for RFID-enabled supply chains

Author keywords

[No Author keywords available]

Indexed keywords

CLONE DETECTION; COUNTERFEIT PRODUCTS; FINANCIAL LOSS; GLOBAL KNOWLEDGE; PRIVACY PRESERVING; PRODUCT RECALLS; RF-ID TAGS; RFID-ENABLED SUPPLY CHAINS; SECURE MULTI-PARTY COMPUTATION; SUPPLY CHAIN DYNAMICS; SUPPLY CHAIN PARTNERS; SUPPLY CHAIN STRUCTURES;

EID: 77953896815     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RFID.2010.5467257     Document Type: Conference Paper
Times cited : (39)

References (37)
  • 1
    • 37049031225 scopus 로고    scopus 로고
    • Organisation for Economic Co-operation and Development OECD, June
    • Organisation for Economic Co-operation and Development, The economic impact of counterfeiting and piracy. OECD, June 2008.
    • (2008) The Economic Impact of Counterfeiting and Piracy
  • 2
    • 77951707319 scopus 로고    scopus 로고
    • EPCglobal, v. 1.3 Standard
    • EPCglobal, "Architecture framework v. 1.3," Standard, 2009.
    • (2009) Architecture Framework
  • 3
    • 33644541758 scopus 로고    scopus 로고
    • Extending the EPC network: The potential of RFID in anti-counterfeiting
    • T. Staake, F. Thiesse, and E. Fleisch, "Extending the EPC network: the potential of RFID in anti-counterfeiting," in Proc. ACM SAC, 2005.
    • Proc. ACM SAC, 2005
    • Staake, T.1    Thiesse, F.2    Fleisch, E.3
  • 4
    • 34249004567 scopus 로고    scopus 로고
    • Collaborative supply chain practices and evolving technological approaches
    • K. Pramatari, "Collaborative supply chain practices and evolving technological approaches," Supply Chain Management, vol. 12, no. 3, 2007.
    • (2007) Supply Chain Management , vol.12 , Issue.3
    • Pramatari, K.1
  • 6
    • 77649263434 scopus 로고    scopus 로고
    • Privacy enhancing technologies for RFID - A critical investigation of state of the art research
    • S. Spiekermann and S. Evdokimov, "Privacy enhancing technologies for RFID - a critical investigation of state of the art research," in Proc. IEEE Privacy and Security, 2009.
    • Proc. IEEE Privacy and Security, 2009
    • Spiekermann, S.1    Evdokimov, S.2
  • 8
    • 33644794716 scopus 로고    scopus 로고
    • Radio frequency identification (RFID) performance: The effect of tag orientation and package contents
    • R. H. Clarke, D. Twede, J. R. Tazelaar, and K. K. Boyer, "Radio frequency identification (RFID) performance: the effect of tag orientation and package contents," Packag. Technol. and Sci., vol. 19, no. 1, 2006.
    • (2006) Packag. Technol. and Sci. , vol.19 , Issue.1
    • Clarke, R.H.1    Twede, D.2    Tazelaar, J.R.3    Boyer, K.K.4
  • 9
    • 80052383468 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacy-preserving computations
    • D. Bogdanov, S. Laur, and J. Willemson, "Sharemind: a framework for fast privacy-preserving computations," in Proc. ESORICS, 2008.
    • (2008) Proc. ESORICS
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 11
    • 77953909887 scopus 로고    scopus 로고
    • EPCglobal, v. 1.2.0, Standard
    • EPCglobal, "UHF Class 1 Gen 2 Standard v. 1.2.0," Standard, 2008.
    • (2008) UHF Class 1 Gen 2 Standard
  • 12
    • 0000534667 scopus 로고    scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in Proc. CRYPTO 84, 1985.
    • Proc. CRYPTO 84 1985
    • El Gamal, T.1
  • 13
    • 0000135789 scopus 로고
    • A threshold cryptosystem without a trusted party (extended abstract)
    • extended abstract
    • T. P. Pederson, "A threshold cryptosystem without a trusted party (extended abstract)," in EUROCRYPT, 1991.
    • (1991) EUROCRYPT
    • Pederson, T.P.1
  • 17
  • 19
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2
    • Chaum, D.L.1
  • 21
    • 77953888466 scopus 로고    scopus 로고
    • http://www.brics.dk/SMCL/.
  • 22
    • 77953895062 scopus 로고    scopus 로고
    • http://www.sikkerhed.alexandra.dk/uk/projects/scet.htm.
  • 23
    • 34548749964 scopus 로고    scopus 로고
    • Efficient privacy-preserving association rule mining: P4P style
    • Y. Duan, J. F. Canny, and J. Z. Zhan, "Efficient privacy-preserving association rule mining: P4P style," in CIDM, 2007.
    • (2007) CIDM
    • Duan, Y.1    Canny, J.F.2    Zhan, J.Z.3
  • 26
    • 70349271128 scopus 로고    scopus 로고
    • How to detect cloned tags in a reliable way from incomplete RFID traces
    • -, "How to detect cloned tags in a reliable way from incomplete RFID traces," in Proc. IEEE Int. Conf. on RFID, 2009.
    • Proc. IEEE Int. Conf. on RFID, 2009
  • 27
    • 62349106096 scopus 로고    scopus 로고
    • Deckard: A system to detect change of RFID tag ownership
    • L. Mirowski and J. Hartnett, "Deckard: a system to detect change of RFID tag ownership," IJCSNS, vol. 7, no. 7, 2007.
    • (2007) IJCSNS , vol.7 , Issue.7
    • Mirowski, L.1    Hartnett, J.2
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Comm. ACM, vol. 22, no. 11, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.