-
1
-
-
59649125918
-
RFID-enabled discovery of supply networks
-
Bi, HH & Lin, DKJ 2009, 'RFID-Enabled Discovery of Supply Networks', Engineering Management, IEEE Transactions on, vol. 56, no. 1, pp. 129-41.
-
(2009)
Engineering Management, IEEE Transactions on
, vol.56
, Issue.1
, pp. 129-141
-
-
Bi, H.H.1
Lin, D.K.J.2
-
2
-
-
49049105769
-
Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications
-
Devadas, S, Suh, E, Paral, S, Sowell, R, Ziola, T & Khandelwal, V 2008, 'Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications', in RFID, 2008 IEEE International Conference on, pp. 58-64.
-
(2008)
RFID, 2008 IEEE International Conference on
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
3
-
-
84856207915
-
Mutual authentication protocol for networked rfid systems
-
Fernando, H & Abawajy, J 2011, 'Mutual Authentication Protocol for Networked RFID Systems', in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, pp. 417-24.
-
(2011)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
, pp. 417-424
-
-
Fernando, H.1
Abawajy, J.2
-
4
-
-
80051668213
-
Networked rfid systems
-
PH Cole & DC Ranasinghe (eds) , Springer Berlin Heidelberg
-
Ranasinghe, DC & Cole, PH 2008, 'Networked RFID Systems', in PH Cole & DC Ranasinghe (eds), Networked RFID Systems and Lightweight Cryptography, Springer Berlin Heidelberg, pp. 45-58.
-
(2008)
Networked RFID Systems and Lightweight Cryptography
, pp. 45-58
-
-
Ranasinghe, D.C.1
Cole, P.H.2
-
5
-
-
84860657792
-
Checker: On-site checking in rfid-based supply chains'
-
Tucson, Arizona, USA
-
Elkhiyaoui, K, Blass, E-O & Molva, R 2012, 'CHECKER: on-site checking in RFID-based supply chains', paper presented to Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, Arizona, USA.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
-
-
Elkhiyaoui, K.1
Blass, E.-O.2
Molva, R.3
-
6
-
-
84885963806
-
Critical analysis and comparative study of security for networked rfid systems
-
Ray, BR, Chowdhury, M & Abawajy, J 2013, 'Critical Analysis and Comparative Study of Security for Networked RFID Systems', in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2013 14th ACIS International Conference on, pp. 197-202.
-
(2013)
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2013 14th ACIS International Conference on
, pp. 197-202
-
-
Ray, B.R.1
Chowdhury, M.2
Abawajy, J.3
-
8
-
-
84926392632
-
-
Ouafi, KaV, Serge 2009, 'Pathchecker: an RFID Application for Tracing Products in Suply-Chains', paper presented to Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium, Belgium
-
Ouafi, KaV, Serge 2009, 'Pathchecker: an RFID Application for Tracing Products in Suply-Chains', paper presented to Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium, Belgium.
-
-
-
-
9
-
-
77953897563
-
Supply chain control using a RFID proxy re-signature scheme
-
Burbridge, T & Soppera, A 2010, 'Supply chain control using a RFID proxy re-signature scheme', in RFID, 2010 IEEE International Conference on, pp. 29-36.
-
(2010)
RFID, 2010 IEEE International Conference on
, pp. 29-36
-
-
Burbridge, T.1
Soppera, A.2
-
10
-
-
85180623483
-
Tracker: Security and privacy for rfidbased supply chains
-
Blass, E, Elkhiyaoui, K., Molva, R. 2011, 'Tracker: Security and Privacy for RFIDbased Supply Chains', paper presented to In: Proceedinsg of the 18th Network and Distributed System Security Symposium.
-
(2011)
Proceedinsg of the 18th Network and Distributed System Security Symposium
-
-
Blass, E.1
Elkhiyaoui, K.2
Molva, R.3
-
11
-
-
84860657792
-
CHECKER: On-site checking in RFID-based supply chains
-
Tucson, Arizona, USA
-
Elkhiyaoui, K, Blass, E-O & Molva, R 2012, 'CHECKER: on-site checking in RFID-based supply chains', paper presented to Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, Arizona, USA.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
-
-
Elkhiyaoui, K.1
Blass, E.-O.2
Molva, R.3
-
13
-
-
34547623904
-
Physically unclonable function-based security and privacy in rfid systems
-
Bolotnyy, L & Robins, G 2007, 'Physically Unclonable Function-Based Security and Privacy in RFID Systems', in Pervasive Computing and Communications, 2007. PerCom '07. Fifth Annual IEEE International Conference on, pp. 211-20.
-
(2007)
Pervasive Computing and Communications, 2007. PerCom '07. Fifth Annual IEEE International Conference on
, pp. 211-220
-
-
Bolotnyy, L.1
Robins, G.2
-
14
-
-
85019715933
-
Enhancing rfid security and privacy by physically unclonable functions
-
in A-R Sadeghi & D Naccache (eds), , Springer Berlin Heidelberg
-
Sadeghi, A-R, Visconti, I & Wachsmann, C 2010, 'Enhancing RFID Security and Privacy by Physically Unclonable Functions', in A-R Sadeghi & D Naccache (eds), Towards Hardware-Intrinsic Security, Springer Berlin Heidelberg, pp. 281-305.
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 281-305
-
-
Sadeghi, A.-R.1
Visconti, I.2
Wachsmann, C.3
-
15
-
-
80455162388
-
PUF based scalable private rfid authentication
-
Akgun, M & Caglayan, MU 2011, 'PUF Based Scalable Private RFID Authentication', in Availability, Reliability and Security (ARES), 2011 Sixth International Conference on, pp. 473-8.
-
(2011)
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
, pp. 473-478
-
-
Akgun, M.1
Caglayan, M.U.2
-
16
-
-
84876769907
-
HRP: A HMAC-based RFID mutual authentication protocol using PUF
-
Seung Wook, J & Souhwan, J 2013, 'HRP: A HMAC-based RFID mutual authentication protocol using PUF', in Information Networking (ICOIN), 2013 International Conference on, pp. 578-82.
-
(2013)
Information Networking (ICOIN), 2013 International Conference on
, pp. 578-582
-
-
Seung Wook, J.1
Souhwan, J.2
-
17
-
-
84872334878
-
Performance evaluation of the first commercial PUF-embedded RFID
-
Hyunho, K, Hori, Y & Satoh, A 2012, 'Performance evaluation of the first commercial PUF-embedded RFID', in Consumer Electronics (GCCE), 2012 IEEE 1st Global Conference on, pp. 5-8.
-
(2012)
Consumer Electronics (GCCE), 2012 IEEE 1st Global Conference on
, pp. 5-8
-
-
Hyunho, K.1
Hori, Y.2
Satoh, A.3
-
18
-
-
84873433835
-
-
Springer, 2007
-
Y. Dodis, L. Reyzin, A. Smith 2007, in Security with Noisy Data, chapter Fuzzy Extractors, (Springer, 2007), pp. 79-99
-
(2007)
Security with Noisy Data, Chapter Fuzzy Extractors
, pp. 79-99
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
19
-
-
84873433835
-
-
Springer, 2007
-
Y. Dodis, L. Reyzin, A. Smith 2007, in Security with Noisy Data, chapter Fuzzy Extractors, (Springer, 2007), pp. 79-99
-
(2007)
Security with Noisy Data, Chapter Fuzzy Extractors
, pp. 79-99
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
|