-
1
-
-
10244234065
-
RFID technologies: Supply-chain applications and implementation issues
-
R. Angeles. RFID Technologies: Supply-Chain Applications and Implementation Issues. IS Management, 22(1):51-65, 2005.
-
(2005)
IS Management
, vol.22
, Issue.1
, pp. 51-65
-
-
Angeles, R.1
-
3
-
-
78650387729
-
RFID: Technology, systems and applications. German association for information technology
-
H. Birgit. RFID: Technology, Systems and Applications. German Association for Information Technology, Telecommun., and New Media e.V. Whitepaper, 2005.
-
(2005)
Telecommun., and New Media E.V. Whitepaper
-
-
Birgit, H.1
-
4
-
-
51049092732
-
Hash functions and RFID tags: Mind the gap
-
Berlin, Heidelberg, Springer
-
A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, and Y. Seurin. Hash Functions and RFID Tags: Mind the Gap. In Proceedings of the 10th Int'l Workshop on Cryptographic Hardware and Embedded Syst., pages 283-299, Berlin, Heidelberg, 2008. Springer.
-
(2008)
Proceedings of the 10th Int'l Workshop on Cryptographic Hardware and Embedded Syst.
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.5
Seurin, Y.6
-
5
-
-
78649387866
-
Bundesverband Informationswirtschaft, Telekommunikation und neue Medien
-
Bundesverband Informationswirtschaft, Telekommunikation und neue Medien. White Paper RFID Technologie, Systeme und Anwendungen, 2005.
-
(2005)
White Paper RFID Technologie, Systeme und Anwendungen
-
-
-
7
-
-
77951127151
-
An empirical study for protecting passive RFID systems against cloning
-
Washington, DC, USA, IEEE Computer Society
-
M. M. El-Said and I. Woodring. An Empirical Study for Protecting Passive RFID Systems against Cloning. In Proceedings of the 6th Int'l Conf. on Information Technology, pages 558-563, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
Proceedings of the 6th Int'l Conf. on Information Technology
, pp. 558-563
-
-
El-Said, M.M.1
Woodring, I.2
-
8
-
-
78650328348
-
-
EPCIS Standard v. 1.0.1
-
EPCGlobal. EPCIS Standard v. 1.0.1. http://www.epcglobalinc.org/ standards/epcis/epcis-1-0-1-standard-20070921.pdf1, 2007.
-
(2007)
EPCGlobal
-
-
-
9
-
-
78650390009
-
-
Object Naming Service Standard v.1.0.1.
-
EPCGlobal. Object Naming Service Standard v.1.0.1. http://www. epcglobalinc.org/standards/ons/ons-1-0-1-standard-20080529.pdf1, 2008.
-
(2008)
EPCGlobal
-
-
-
10
-
-
78650390009
-
-
Tag Data Standard v. 1.4.
-
EPCGlobal. Tag Data Standard v. 1.4. http://www.epcglobalinc.org/ standards/tds/tds-1-4-standard-20080611.pdf1, 2008.
-
(2008)
EPCGlobal
-
-
-
13
-
-
14244253910
-
An approach to security and privacy of RFID system for supply chain
-
Washington, DC, USA. IEEE Computer Society
-
X. Gao et al. An Approach to Security and Privacy of RFID System for Supply Chain. In Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE Int'l Conf., pages 164-168, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE Int'l Conf.
, pp. 164-168
-
-
Gao, X.1
-
14
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
S. L. Garfinkel, A. Juels, and R. Pappu. RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy, 3:34-43, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
16
-
-
78650407455
-
-
IP Crime Group
-
IP Crime Group. IP Crime Report, 2008.
-
(2008)
IP Crime Report
-
-
-
17
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
New York, NY, USA, ACM
-
A. Juels, R. L. Rivest, andM. Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Proceedings of the 10th Conf. on Computer and Commun. Security, pages 103-111, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 10th Conf. on Computer and Commun. Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
20
-
-
35248846439
-
POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
-
New York, NY, USA. ACM
-
S. Koralalage et al. POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism. In Proceedings of the ACM Symposium on Applied Computing, pages 270-275, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 270-275
-
-
Koralalage, S.1
-
21
-
-
84944878354
-
-
CRC Press, Inc., Boca Raton, FL, USA
-
A. J. Menezes, S. A. Vanstone, and P. C. Van Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Van Oorschot, P.C.3
-
22
-
-
34547367358
-
The pros and cons of RFID in supply chain management
-
Washington, DC, USA, IEEE Computer Society
-
K. Michael and L. McCathie. The Pros and Cons of RFID in Supply Chain Management. In Proceedings of the Int'l Conf. on Mobile Business, pages 623-629, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the Int'l Conf. on Mobile Business
, pp. 623-629
-
-
Michael, K.1
McCathie, L.2
-
24
-
-
74349089033
-
A simulation of the pharmaceutical supply chain to provide realistic test data
-
J. Müller, C. Pöpke, M. Urbat, A. Zeier, and H. Plattner. A Simulation of the Pharmaceutical Supply Chain to Provide Realistic Test Data. In Proceedings of the Int'l Conf. on Advances in System Simulation, 2009.
-
(2009)
Proceedings of the Int'l Conf. on Advances in System Simulation
-
-
Müller, J.1
Pöpke, C.2
Urbat, M.3
Zeier, A.4
Plattner, H.5
-
26
-
-
70349087741
-
A low-resource Public-Key Identification Scheme for RFID Tags and Sensor Nodes
-
New York, NY, USA, ACM
-
Y. Oren and M. Feldhofer. A low-resource Public-Key Identification Scheme for RFID Tags and Sensor Nodes. In Proceedings of the 2nd ACM Conf. on Wireless Network Security, pages 59-68, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 2nd ACM Conf. on Wireless Network Security
, pp. 59-68
-
-
Oren, Y.1
Feldhofer, M.2
-
28
-
-
73049108376
-
A common database approach for OLTP and OLAP using an in-memory column database
-
New York, NY, USA, ACM
-
H. Plattner. A Common Database Approach for OLTP and OLAP using an in-memory Column Database. In Proceedings of the 35th SIGMOD Int'l Conf. on Management of Data, pages 1-2, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 35th SIGMOD Int'l Conf. on Management of Data
, pp. 1-2
-
-
Plattner, H.1
-
32
-
-
77649263434
-
Privacy enhancing technologies for RFID - A critical investigation of state of the art research
-
S. Spiekermann and S. Evdokimov. Privacy Enhancing Technologies for RFID - A Critical Investigation of State of the Art Research. In IEEE Privacy and Security, 2009.
-
(2009)
IEEE Privacy and Security
-
-
Spiekermann, S.1
Evdokimov, S.2
-
34
-
-
70350431716
-
Privacy and ethical issues in location-based tracking systems
-
Washington, DC, USA. IEEE Computer Society
-
J. L. Wang and M. C. Loui. Privacy and Ethical Issues in Location-Based Tracking Systems. In Proceedings of the IEEE Int'l Symposium on Technology and Society, pages 1-4, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
Proceedings of the IEEE Int'l Symposium on Technology and Society
, pp. 1-4
-
-
Wang, J.L.1
Loui, M.C.2
-
37
-
-
77949466860
-
Integration of RFID technology is a key enabler for demand-driven supply network
-
A. Zeier, P. Hofmann, J. Krüger, J. Müller, and M.-P. Schapranow. Integration of RFID Technology is a Key Enabler for Demand-Driven Supply Network. ICFAI University Journal of Supply Chain Management, 2009.
-
(2009)
ICFAI University Journal of Supply Chain Management
-
-
Zeier, A.1
Hofmann, P.2
Krüger, J.3
Müller, J.4
Schapranow, M.-P.5
|