-
1
-
-
84885182389
-
Supply chain product visibility: Methods, systems and impacts
-
A. Musa, A. Gunasekaran, and Y. Yusuf, " Supply chain product visibility: Methods, systems and impacts", Expert Systems with Applications, vol.41, pp.176-194, 2014
-
(2014)
Expert Systems with Applications
, vol.41
, pp. 176-194
-
-
Musa, A.1
Gunasekaran, A.2
Yusuf, Y.3
-
2
-
-
80052261673
-
Product safety and security in the global supply chain: Issues, challenges and research opportunities
-
A. Marucheck, N. Greis, C. Mena, and L. Cai, " Product safety and security in the global supply chain: Issues, challenges and research opportunities," Journal of Operations Management, vol. 29, pp.707-720, 2011
-
(2011)
Journal of Operations Management
, vol.29
, pp. 707-720
-
-
Marucheck, A.1
Greis, N.2
Mena, C.3
Cai, L.4
-
3
-
-
84896547249
-
Traceability issues in food supply chain management: A review
-
F. Dabbene, P. Gay, and C. Tortia, " Traceability issues in food supply chain management: A review," Biosystems Engineering, vol. 120, pp.65-80,2014
-
(2014)
Biosystems Engineering
, vol.120
, pp. 65-80
-
-
Dabbene, F.1
Gay, P.2
Tortia, C.3
-
4
-
-
78650736984
-
-
EPCglobal, "Pedigree Ratified Standard version 1.0", http://www.gs1.org/gsmp/kc/epcglobal/pedigree/pedigree-1-0-standard-20070105.pdf, 2007, pp.1-138
-
(2007)
Pedigree Ratified Standard Version 1.0
, pp. 1-138
-
-
-
5
-
-
84855786590
-
Costs of authentic pharmaceuticals: Research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chain
-
M. Schapranow, J. Muller, A. Zeier, and H. Plattner, " Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chain," Pers. Ubiqui. Comput. Vol.16, pp.271-289, 2012
-
(2012)
Pers. Ubiqui. Comput
, vol.16
, pp. 271-289
-
-
Schapranow, M.1
Muller, J.2
Zeier, A.3
Plattner, H.4
-
6
-
-
74349115269
-
An RFID based anti-counterfeiting system
-
S. H. Choi, and C. H. Poon, " An RFID based anti-counterfeiting system," IAENG Int. J. of Compu. Sci., vol.35, 2008, pp.1-12, http://www.iaeng.org/IJCS/issues-v35/issue-1/IJCS-35-1-12.pdf
-
(2008)
IAENG Int. J. of Compu. Sci
, vol.35
, pp. 1-12
-
-
Choi, S.H.1
Poon, C.H.2
-
8
-
-
84988837316
-
-
April 14
-
EPCglobal,Inc. "Architecture Framework v.1.6," http://www.gs1.org/ docs/gsmp/architecture/GS1-System-Architecture.pdf, pp.1-71, April 14, 2014
-
(2014)
Architecture Framework v.1.6
, pp. 1-71
-
-
EPCglobalInc1
-
9
-
-
80052166150
-
Distributed data mining with differential privacy
-
Kyoto, Japan, June
-
N. Zhang, M. Li, and W. Lou. Distributed data mining with differential privacy. In Proc. of ICC 2011, Kyoto, Japan, June 2011
-
(2011)
Proc. of ICC 2011
-
-
Zhang, N.1
Li, M.2
Lou, W.3
-
10
-
-
84974555530
-
Privacy preserving data mning
-
Springer-Verlag
-
Y. Lindell and B. Pinkas. " Privacy preserving data mning." In Journal of Cryptology, Springer-Verlag, pp.36-54, 2000
-
(2000)
Journal of Cryptology
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
12
-
-
84957827779
-
Object event visibility for anti-counterfeiting in RFID-enabled product supply chains
-
July 28-30, London, UK
-
X.Yao, X. Zhou, and J. Ma. "Object Event Visibility for Anti-Counterfeiting in RFID-Enabled Product Supply Chains", in proc. Of SAI2015, July 28-30, London, UK, 2015
-
(2015)
Proc. of SAI2015
-
-
Yao, X.1
Zhou, X.2
Ma, J.3
-
13
-
-
84988817933
-
A secure multi-party computation protocol for malicious computation prevention for preserving privacy during data mining
-
July
-
D. Mishra, N. Koria, N. Kapoor, and R. Bahety. "A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for Preserving Privacy during Data Mining." (IJCSIS) International Journal of Computer Science &Information Security, Vol.3, No.1, July 2009, pp 79-85
-
(2009)
(IJCSIS) International Journal of Computer Science &Information Security
, vol.3
, Issue.1
, pp. 79-85
-
-
Mishra, D.1
Koria, N.2
Kapoor, N.3
Bahety, R.4
-
14
-
-
84906500207
-
Privacy-preserving complex query evaluation over semantically secure encrypted data
-
B. Samanthula, W. Jiang, and E. Bertino. Privacy-preserving complex query evaluation over semantically secure encrypted data. In ESORICS, pp. 400-418, 2014
-
(2014)
ESORICS
, pp. 400-418
-
-
Samanthula, B.1
Jiang, W.2
Bertino, E.3
-
15
-
-
26444553177
-
-
Cambridge University Press, Cambridge, England
-
O. Goldreich. The Foundations of Cryptography, volume 2, chapter Encryption Schemes, pages 373-470. Cambridge University Press, Cambridge, England, 2004
-
(2004)
The Foundations of Cryptography, Volume 2, Chapter Encryption Schemes
, pp. 373-470
-
-
Goldreich, O.1
-
17
-
-
70349305273
-
Differential privacy: A survey of results
-
Springer
-
C. Dwork. Differential privacy: A survey of results. In Proc. 5th TAMC, pages 1-19. Springer, 2008
-
(2008)
Proc. 5th TAMC
, pp. 1-19
-
-
Dwork, C.1
-
18
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Theory of Cryptography Conference, pages 265-284. Springer, 2006
-
(2006)
Proceedings of the 3rd Theory of Cryptography Conference
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
21
-
-
78049357399
-
Secure multiparty computation for privacypreserving data mining
-
Y. Lindell and B. Pinkas, "Secure multiparty computation for privacypreserving data mining," Journal of Privacy and Confidentiality, vol. 1, no. 1, pp. 59-98, 2008
-
(2008)
Journal of Privacy and Confidentiality
, vol.1
, Issue.1
, pp. 59-98
-
-
Lindell, Y.1
Pinkas, B.2
-
22
-
-
84968809625
-
-
Ph.D dissertation, dept. of computer science, college of sciences, The University of Texas at San Antonio, May
-
X. Jin. "Attribute-based access control models and implementation in cloud infrastructure as a service", Ph.D dissertation, dept. of computer science, college of sciences, The University of Texas at San Antonio, May, 2014
-
(2014)
Attribute-based Access Control Models and Implementation in Cloud Infrastructure As A Service
-
-
Jin, X.1
-
23
-
-
84939603941
-
Differential privacy: An economic method for choosing epsilon
-
J. Hsu, M. Gaboardi, A. Haeberlen, S. Khanna, A. Narayan, Benjamin C. Pierce, and A. Roth. Differential privacy: An economic method for choosing epsilon. In Proceedings of 27th IEEE Computer Security Foundations Symposium (CSF), 2014
-
(2014)
Proceedings of 27th IEEE Computer Security Foundations Symposium (CSF)
-
-
Hsu, J.1
Gaboardi, M.2
Haeberlen, A.3
Khanna, S.4
Narayan, A.5
Pierce, B.C.6
Roth, A.7
|