-
2
-
-
34547367358
-
The pros and cons of RFID in supply chain management
-
Sydney, Australia: Springer Berlin / Heidelberg
-
K. Michael and L. McCathie. "The pros and cons of RFID in supply chain management". in International Conference on Mobile Business. Sydney, Australia: Springer Berlin / Heidelberg, 2005
-
(2005)
International Conference on Mobile Business
-
-
Michael, K.1
McCathie, L.2
-
5
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
DOI 10.1109/TDSC.2007.70226
-
H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity". Transactions on Dependable and Secure Computing. vol. 4, 2007, pp. 337-340. (Pubitemid 350125898)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
7
-
-
78650358321
-
LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador and A. Ribagorda. "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags". in Work Shop on on RFID and Lightweight Crypto. Graz, Austria, 2006
-
Work Shop on on RFID and Lightweight Crypto. Graz, Austria, 2006
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
9
-
-
70350625235
-
Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M.E. Tapiador and A. Ribagorda, "Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol". Lecture Notes in Computer Science. vol. 5379, 2008, pp. 56-68.
-
(2008)
Lecture Notes in Computer Science.
, vol.5379
, pp. 56-68
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.M.E.3
Ribagorda, A.4
-
10
-
-
49049096211
-
A Tamper Detection Method for RFID Tag Data
-
Las Vegas, Nevada: IEEE, New York
-
A. Yamamoto, S. Suzuki, H. Hada, J. Mitsugi, F. Teraoka, and O. Nakamura. "A Tamper Detection Method for RFID Tag Data". in IEEE International Conference on RFID. Las Vegas, Nevada: IEEE, New York, 2008
-
(2008)
IEEE International Conference on RFID
-
-
Yamamoto, A.1
Suzuki, S.2
Hada, H.3
Mitsugi, J.4
Teraoka, F.5
Nakamura, O.6
-
12
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
H.Y. Chien and C.H. Chen, "Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards". Computer Standards & Interfaces. vol. 29, 2007, pp. 254-259.
-
(2007)
Computer Standards & Interfaces.
, vol.29
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
14
-
-
33645970405
-
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting
-
Singapore: Springer Berlin / Heidelberg
-
X. Zhang and B. King. "Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting". in 8th International Conference on Information security. Singapore: Springer Berlin / Heidelberg, 2005
-
(2005)
8th International Conference on Information Security
-
-
Zhang, X.1
King, B.2
-
15
-
-
67650109513
-
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
-
Hiroshima, Japan: Springer Berlin / Heidelberg
-
D.N. Duc, J. Park, H. Lee and K. Kim. "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning". in Symposium on Cryptography and Information Security. Hiroshima, Japan: Springer Berlin / Heidelberg, 2006
-
(2006)
Symposium on Cryptography and Information Security
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
16
-
-
51349094869
-
Recovering and restoring tampered RFID data using steganographic principles
-
Mumbai, India: IEEE, New York
-
M. Mohan, V. Potdar, E. Chang and W.A. Perth. "Recovering and restoring tampered RFID data using steganographic principles". in Proceedings of the IEEE International Conference on Industrial Technology. Mumbai, India: IEEE, New York, 2006
-
(2006)
Proceedings of the IEEE International Conference on Industrial Technology
-
-
Mohan, M.1
Potdar, V.2
Chang, E.3
Perth, W.A.4
-
17
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
A. Juels, "Minimalist cryptography for low-cost RFID tags". Security in Communication Networks. vol. 3352, 2004, pp. 149-164.
-
(2004)
Security in Communication Networks
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
20
-
-
70449990339
-
Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI
-
R. Phan, "Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI". IEEE Transactions on Dependable and Secure Computing. vol. 99, 2008.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.99
-
-
Phan, R.1
-
22
-
-
45949090154
-
Enhancing information flow in a retail supply chain using RFID and the EPC network
-
S.F. Wamba and H. Boeck, "Enhancing information flow in a retail supply chain using RFID and the EPC network". J. Theor. Appl. Electron. Commer. Res., vol. 3, 2008, pp. 92-105.
-
(2008)
J. Theor. Appl. Electron. Commer. Res.
, vol.3
, pp. 92-105
-
-
Wamba, S.F.1
Boeck, H.2
-
23
-
-
77953839620
-
RFID middleware design: Addressing application requirements and RFID constraints
-
ACM, New York: Grenoble, France.
-
F. Christian and L. Matthias, RFID middleware design: addressing application requirements and RFID constraints, in Proceedings of the joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies, ACM, New York: Grenoble, France. p. 219-224, 2005
-
(2005)
Proceedings of the Joint Conference on Smart Objects and Ambient Intelligence: Innovative Context-aware Services: Usages and Technologies
, pp. 219-224
-
-
Christian, F.1
Matthias, L.2
-
24
-
-
42549157259
-
A framework for assessing RFID system security and privacy risks
-
DOI 10.1109/MPRV.2008.22, 4487091
-
P. Rotter, "A framework for assessing RFID system security and privacy risks". IEEE Pervasive Computing. vol. 7, 2008, pp. 70-77. (Pubitemid 351575124)
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.2
, pp. 70-77
-
-
Rotter, P.1
-
25
-
-
74549178701
-
RFID data management: Challenges and opportunities
-
R. Derakhshan, M.E. Orlowska and X. Li. "RFID data management: challenges and opportunities". in IEEE International Conference on RFID, Grapevine, TX IEEE, 2007
-
IEEE International Conference on RFID, Grapevine, TX IEEE, 2007
-
-
Derakhshan, R.1
Orlowska, M.E.2
Li, X.3
|