-
1
-
-
84857447508
-
Business strategies in the counterfeit market
-
Thorsten Staake, Frĺ ȩdĺ ȩ ric Thiesse, and Elgar Fleisch. Business strategies in the counterfeit market. Journal of Business Research, 65(5):658 - 665, 2012.
-
(2013)
Journal of Business Research
, vol.65
, Issue.5
, pp. 658-665
-
-
Staake, T.1
Thiesse, F.2
Fleisch, E.3
-
3
-
-
84882949243
-
The spread of counterfeiting: Knock-offs catch on
-
The spread of counterfeiting: Knock-offs catch on. The Economist, 2010.
-
(2010)
The Economist
-
-
-
4
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. Security in pervasive computing, pages 50-59, 2004.
-
(2004)
Security in Pervasive Computing
, pp. 50-59
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
5
-
-
34547617482
-
Dynamic key-updating: Privacy-preserving authentication for rfid systems
-
L. Lu, J. Han, L. Hu, Y. Liu, and L.M. Ni. Dynamic key-updating: Privacy-preserving authentication for rfid systems. In Proc. of IEEE PERCOM, 2007.
-
(2007)
Proc. of IEEE PERCOM
-
-
Lu, L.1
Han, J.2
Hu, L.3
Liu, Y.4
Ni, L.M.5
-
8
-
-
34547623904
-
Physically unclonable function-based security and privacy in rfid systems
-
L. Bolotnyy and G. Robins. Physically unclonable function-based security and privacy in rfid systems. In Proc. of IEEE PERCOM, 2007.
-
(2007)
Proc. of IEEE PERCOM
-
-
Bolotnyy, L.1
Robins, G.2
-
9
-
-
49049105964
-
Ec-rac (ecdlp based randomized access control): Provably secure rfid authentication protocol
-
Y.K. Lee, L. Batina, and I. Verbauwhede. Ec-rac (ecdlp based randomized access control): Provably secure rfid authentication protocol. In Proc. of IEEE RFID, 2008.
-
(2008)
Proc. of IEEE RFID
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
11
-
-
0002544335
-
Aloha packet system with and without slots and capture
-
L.G. Roberts. Aloha packet system with and without slots and capture. ACM SIGCOMM Computer Communication Review, 5(2):28-42, 1975.
-
(1975)
ACM SIGCOMM Computer Communication Review
, vol.5
, Issue.2
, pp. 28-42
-
-
Roberts, L.G.1
-
14
-
-
83055194205
-
Anticollision protocols for single-reader rfid systems: Temporal analysis and optimization
-
T.F. La Porta, G. Maselli, and C. Petrioli. Anticollision protocols for single-reader rfid systems: Temporal analysis and optimization. IEEE Transactions on Mobile Computing, 10(2):267-279, 2011.
-
(2011)
IEEE Transactions on Mobile Computing
, vol.10
, Issue.2
, pp. 267-279
-
-
La Porta, T.F.1
Maselli, G.2
Petrioli, C.3
-
16
-
-
0018522043
-
Tree algorithms for packet broadcast channels
-
J. Capetanakis. Tree algorithms for packet broadcast channels. IEEE Transactions on Information Theory, 25(5):505-515, 1979.
-
(1979)
IEEE Transactions on Information Theory
, vol.25
, Issue.5
, pp. 505-515
-
-
Capetanakis, J.1
-
17
-
-
33748075808
-
Adaptive splitting protocols for rfid tag collision arbitration
-
J. Myung and W. Lee. Adaptive splitting protocols for rfid tag collision arbitration. In Proc. of ACM MobiHoc, 2006.
-
(2006)
Proc. of ACM MobiHoc
-
-
Myung, J.1
Lee, W.2
-
20
-
-
33750353849
-
A secure and efficient rfid protocol that could make big brother (partially) obsolete
-
T. Dimitriou. A secure and efficient rfid protocol that could make big brother (partially) obsolete. In Proc. of IEEE PERCOM, 2006.
-
(2006)
Proc. of IEEE PERCOM
-
-
Dimitriou, T.1
-
23
-
-
79960838804
-
Cardinality estimation for large-scale rfid systems
-
C. Qian, H. Ngan, Y. Liu, and L.M. Ni. Cardinality estimation for large-scale rfid systems. IEEE Transactions on Parallel and Distributed Systems, 22(9):1441-1454, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.9
, pp. 1441-1454
-
-
Qian, C.1
Ngan, H.2
Liu, Y.3
Ni, L.M.4
-
24
-
-
84866671377
-
Pet: Probabilistic estimating tree for large-scale rfid estimation
-
Y. Zheng and M Li. Pet: Probabilistic estimating tree for large-scale rfid estimation. IEEE Transactions on Mobile Computing, 11(11):1763-1774, 2012.
-
(2013)
IEEE Transactions on Mobile Computing
, vol.11
, Issue.11
, pp. 1763-1774
-
-
Zheng, Y.1
Li, M.2
-
25
-
-
84866621052
-
Every bit counts - Fast and scalable rfid estimation
-
M. Shahzad and A. Liu. Every bit counts - fast and scalable rfid estimation. In Proc. of ACM MobiCom, 2012.
-
(2012)
Proc. of ACM MobiCom
-
-
Shahzad, M.1
Liu, A.2
-
26
-
-
84882933832
-
Generalized energy-efficient algorithms for the rfid estimation problem
-
T. Li, S. S. Wu, S. Chen, and M. C. K. Yang. Generalized energy-efficient algorithms for the rfid estimation problem. IEEE/ACM Transactions on Networking, 20(6):1978 -1990, 2012.
-
(2013)
IEEE/ACM Transactions on Networking
, vol.20
, Issue.6
, pp. 1978-1990
-
-
Li, T.1
Wu, S.S.2
Chen, S.3
Yang, M.C.K.4
-
27
-
-
84883009412
-
Zoe: Fast cardinality estimation for large-scale rfid systems
-
Y. Zheng and M. Li. Zoe: Fast cardinality estimation for large-scale rfid systems. In Proc. of IEEE INFOCOM, 2013.
-
(2013)
Proc. of IEEE INFOCOM
-
-
Zheng, Y.1
Li, M.2
-
29
-
-
49049105769
-
Design and implementation of puf-based unclonable rfid ics for anti-counterfeiting and security applications
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal. Design and implementation of puf-based unclonable rfid ics for anti-counterfeiting and security applications. In Proc. of IEEE RFID, 2008.
-
(2008)
Proc. of IEEE RFID
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
30
-
-
80052800549
-
Fast identification of the missing tags in a large rfid system
-
R. Zhang, Y. Liu, Y. Zhang, and J. Sun. Fast identification of the missing tags in a large rfid system. In Proc. of IEEE SECON, 2011.
-
(2011)
Proc. of IEEE SECON
-
-
Zhang, R.1
Liu, Y.2
Zhang, Y.3
Sun, J.4
-
34
-
-
84882937372
-
-
Open rfid lab, http://pdcc.ntu.edu.sg/wands/orl.
-
-
-
|