-
1
-
-
37049031225
-
-
Organisation for Economic Co-operation and Development OECD, June
-
Organisation for Economic Co-operation and Development, The economic impact of counterfeiting and piracy. OECD, June 2008.
-
(2008)
The Economic Impact of Counterfeiting and Piracy
-
-
-
2
-
-
77951707319
-
-
EPCglobal, v. 1.3 Standard
-
EPCglobal, "Architecture framework v. 1.3," Standard, 2009.
-
(2009)
Architecture Framework
-
-
-
3
-
-
33644541758
-
Extending the EPC network: The potential of RFID in anti-counterfeiting
-
T. Staake, F. Thiesse, and E. Fleisch, "Extending the EPC network: the potential of RFID in anti-counterfeiting," in Proc. ACM SAC, 2005.
-
Proc. ACM SAC, 2005
-
-
Staake, T.1
Thiesse, F.2
Fleisch, E.3
-
4
-
-
34249004567
-
Collaborative supply chain practices and evolving technological approaches
-
K. Pramatari, "Collaborative supply chain practices and evolving technological approaches," Supply Chain Management, vol. 12, no. 3, 2007.
-
(2007)
Supply Chain Management
, vol.12
, Issue.3
-
-
Pramatari, K.1
-
5
-
-
58049141225
-
-
Printed handout of RFIDSec06
-
M. Lehtonen, T. Staake, F. Michahelles, and E. Fleisch, "From identification to authentication - a review of RFID product authentication techniques," Printed handout of RFIDSec06, 2006.
-
(2006)
From Identification to Authentication - A Review of RFID Product Authentication Techniques
-
-
Lehtonen, M.1
Staake, T.2
Michahelles, F.3
Fleisch, E.4
-
6
-
-
77649263434
-
Privacy enhancing technologies for RFID - A critical investigation of state of the art research
-
S. Spiekermann and S. Evdokimov, "Privacy enhancing technologies for RFID - a critical investigation of state of the art research," in Proc. IEEE Privacy and Security, 2009.
-
Proc. IEEE Privacy and Security, 2009
-
-
Spiekermann, S.1
Evdokimov, S.2
-
7
-
-
70349373535
-
-
BRIDGE deliverable D-4.5.1
-
T. Burbridge, V. Broekhuizen, J. Farr, D. Zanetti, E. García Muñoz, J. J. Cantero, M. A. Guijarro, and J. Baños, "RFID network confidentiality," BRIDGE deliverable D-4.5.1, 2007.
-
(2007)
RFID Network Confidentiality
-
-
Burbridge, T.1
Broekhuizen, V.2
Farr, J.3
Zanetti, D.4
García Muñoz, E.5
Cantero, J.J.6
Guijarro, M.A.7
Baños, J.8
-
8
-
-
33644794716
-
Radio frequency identification (RFID) performance: The effect of tag orientation and package contents
-
R. H. Clarke, D. Twede, J. R. Tazelaar, and K. K. Boyer, "Radio frequency identification (RFID) performance: the effect of tag orientation and package contents," Packag. Technol. and Sci., vol. 19, no. 1, 2006.
-
(2006)
Packag. Technol. and Sci.
, vol.19
, Issue.1
-
-
Clarke, R.H.1
Twede, D.2
Tazelaar, J.R.3
Boyer, K.K.4
-
9
-
-
80052383468
-
Sharemind: A framework for fast privacy-preserving computations
-
D. Bogdanov, S. Laur, and J. Willemson, "Sharemind: a framework for fast privacy-preserving computations," in Proc. ESORICS, 2008.
-
(2008)
Proc. ESORICS
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
10
-
-
80051631839
-
Asynchronous multiparty computation: Theory and implementation
-
I. Damgård, M. Geisler, M. Krøigaard, and J. B. Nielsen, "Asynchronous multiparty computation: Theory and implementation," in Proc. Int. Conf. on Practice and Theory in Public Key Cryptography, 2009.
-
Proc. Int. Conf. on Practice and Theory in Public Key Cryptography, 2009
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
11
-
-
77953909887
-
-
EPCglobal, v. 1.2.0, Standard
-
EPCglobal, "UHF Class 1 Gen 2 Standard v. 1.2.0," Standard, 2008.
-
(2008)
UHF Class 1 Gen 2 Standard
-
-
-
12
-
-
0000534667
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in Proc. CRYPTO 84, 1985.
-
Proc. CRYPTO 84 1985
-
-
El Gamal, T.1
-
13
-
-
0000135789
-
A threshold cryptosystem without a trusted party (extended abstract)
-
extended abstract
-
T. P. Pederson, "A threshold cryptosystem without a trusted party (extended abstract)," in EUROCRYPT, 1991.
-
(1991)
EUROCRYPT
-
-
Pederson, T.P.1
-
18
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, "Fairplay - a secure two-party computation system," in Proc. USENIX Security Sym., 2004.
-
Proc. USENIX Security Sym., 2004
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
19
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.L.1
-
21
-
-
77953888466
-
-
http://www.brics.dk/SMCL/.
-
-
-
-
22
-
-
77953895062
-
-
http://www.sikkerhed.alexandra.dk/uk/projects/scet.htm.
-
-
-
-
23
-
-
34548749964
-
Efficient privacy-preserving association rule mining: P4P style
-
Y. Duan, J. F. Canny, and J. Z. Zhan, "Efficient privacy-preserving association rule mining: P4P style," in CIDM, 2007.
-
(2007)
CIDM
-
-
Duan, Y.1
Canny, J.F.2
Zhan, J.Z.3
-
24
-
-
5444256863
-
-
Auto-ID Labs, MIT, White Paper
-
R. Koh, E. W. Schuster, I. Chackrabarti, and A. Bellman, "Securing the pharmaceutical supply chain," Auto-ID Labs, MIT, White Paper, 2003.
-
(2003)
Securing the Pharmaceutical Supply Chain
-
-
Koh, R.1
Schuster, E.W.2
Chackrabarti, I.3
Bellman, A.4
-
26
-
-
70349271128
-
How to detect cloned tags in a reliable way from incomplete RFID traces
-
-, "How to detect cloned tags in a reliable way from incomplete RFID traces," in Proc. IEEE Int. Conf. on RFID, 2009.
-
Proc. IEEE Int. Conf. on RFID, 2009
-
-
-
27
-
-
62349106096
-
Deckard: A system to detect change of RFID tag ownership
-
L. Mirowski and J. Hartnett, "Deckard: a system to detect change of RFID tag ownership," IJCSNS, vol. 7, no. 7, 2007.
-
(2007)
IJCSNS
, vol.7
, Issue.7
-
-
Mirowski, L.1
Hartnett, J.2
-
29
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Comm. ACM, vol. 22, no. 11, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
-
-
Shamir, A.1
-
33
-
-
33749007039
-
Secure computation of surveys
-
J. Feigenbaum, B. Pinkas, R. Ryger, and F. Saint-Jean, "Secure computation of surveys," EU Work. on Secure Multiparty Protocols, 2004.
-
EU Work. on Secure Multiparty Protocols, 2004
-
-
Feigenbaum, J.1
Pinkas, B.2
Ryger, R.3
Saint-Jean, F.4
-
35
-
-
71549138933
-
Privacy-preserving remote diagnostics
-
J. Brickell, D. E. Porter, V. Shmatikov, and E. Witchel, "Privacy-preserving remote diagnostics," in Proc. ACM CCS, 2007.
-
Proc. ACM CCS, 2007
-
-
Brickell, J.1
Porter, D.E.2
Shmatikov, V.3
Witchel, E.4
-
36
-
-
77954694081
-
Secure supply-chain protocols
-
M. Atallah, H. Elmongui, V. Deshpande, and L. Schwarz, "Secure supply-chain protocols," in Proc. IEEE Int. Conf. on E-Commerce, 2003.
-
Proc. IEEE Int. Conf. on E-Commerce, 2003
-
-
Atallah, M.1
Elmongui, H.2
Deshpande, V.3
Schwarz, L.4
-
37
-
-
77953899413
-
Secure collaborative planning, forecasting, and replenishment (SCPFR)
-
M. J. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L. Schwarz, "Secure collaborative planning, forecasting, and replenishment (SCPFR)," M&SOM, 2005.
-
(2005)
M&SOM
-
-
Atallah, M.J.1
Blanton, M.2
Deshpande, V.3
Frikken, K.4
Li, J.5
Schwarz, L.6
|