메뉴 건너뛰기




Volumn , Issue , 2011, Pages

A distributed EPC discovery service based on peer-to-peer technology

Author keywords

[No Author keywords available]

Indexed keywords

ADVANCED TRAFFIC MANAGEMENT SYSTEMS; SUPPLY CHAIN MANAGEMENT; VISIBILITY;

EID: 85091963138     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 3
    • 85091997174 scopus 로고    scopus 로고
    • EPCglobal, EPCglobal Architecture. Accessed 2010-11-30
    • EPCglobal, EPCglobal Architecture. http://www.epcglobalinc.org/standards. Accessed 2010-11-30.
  • 5
    • 85091966993 scopus 로고    scopus 로고
    • Europa.eu Press Release. Customs: Millions of illegal medicines stopped by "MEDI-FAKE action. IP/08/1980
    • Europa.eu Press Release. Customs: Millions of illegal medicines stopped by "MEDI-FAKE" action. IP/08/1980. 2008.
    • (2008)
  • 7
    • 3042647734 scopus 로고    scopus 로고
    • Interoperability of peer-to-peer file sharing protocols
    • S. M. Lui and S. H. Kwok, “Interoperability of peer-to-peer file sharing protocols,” SIGecom Exch., vol. 3, no. 3, pp. 25-33, 2002.
    • (2002) SIGecom Exch , vol.3 , Issue.3 , pp. 25-33
    • Lui, S. M.1    Kwok, S. H.2
  • 8
    • 0035331708 scopus 로고    scopus 로고
    • JXTA: A Network Programming Environment
    • L. Gong, “JXTA: A Network Programming Environment,” IEEE Internet Computing, vol. 5, pp. 88-95, 2001.
    • (2001) IEEE Internet Computing , vol.5 , pp. 88-95
    • Gong, L.1
  • 9
    • 12444292136 scopus 로고    scopus 로고
    • JXTA 2: A high-performance, massively scalable P2P network
    • S. Li, “JXTA 2: A high-performance, massively scalable P2P network,” IBM developerWorks, Tech. Rep., 2003.
    • (2003) IBM developerWorks, Tech. Rep
    • Li, S.1
  • 12
    • 74549162364 scopus 로고    scopus 로고
    • Implementation and testing of an epcglobal-aware discovery service for item-level traceability
    • U. Barchetti, A. Bucciero, M. D. Blasi, L. Mainetti, and L. Patrono, “Implementation and testing of an epcglobal-aware discovery service for item-level traceability,” in ICUMT, 2009, pp. 1-8.
    • (2009) ICUMT , pp. 1-8
    • Barchetti, U.1    Bucciero, A.2    Blasi, M. D.3    Mainetti, L.4    Patrono, L.5
  • 13
    • 79951498653 scopus 로고    scopus 로고
    • An efficient distributed discovery service for epcglobal network in nested package scenarios
    • Press, Corrected Proof, [Online]. Available
    • P. Manzanares-Lopez, J. P. Muñoz-Gea, J. Malgosa-Sanahuja, and J. C. Sanchez-Aarnoutse, “An efficient distributed discovery service for epcglobal network in nested package scenarios,” Journal of Network and Computer Applications, vol. In Press, Corrected Proof, pp. -, 2010. [Online]. Available: http://www.sciencedirect.com/science/article/B6WKB50297NN-3/2/80d898ed6ae19f21c6d6baaaa2bfd902
    • (2010) Journal of Network and Computer Applications
    • Manzanares-Lopez, P.1    Muñoz-Gea, J. P.2    Malgosa-Sanahuja, J.3    Sanchez-Aarnoutse, J. C.4
  • 15
    • 77951762055 scopus 로고    scopus 로고
    • EPCglobal. version 1.4
    • EPCglobal. Tag Data Standard, version 1.4, 2008.
    • (2008) Tag Data Standard
  • 16
    • 36949028920 scopus 로고    scopus 로고
    • PKI design for the real world
    • New York, NY, USA: ACM, [Online]. Available
    • P. Gutmann, “PKI design for the real world,” in Proceedings of the 2006 workshop on New security paradigms, ser. NSPW'06. New York, NY, USA: ACM, 2007, pp. 109-116. [Online]. Available: http://doi.acm.org/10.1145/1278940.1278958
    • (2007) Proceedings of the 2006 workshop on New security paradigms, ser. NSPW'06 , pp. 109-116
    • Gutmann, P.1
  • 17
    • 84882980040 scopus 로고    scopus 로고
    • Plug-and-play PKI: a PKI your mother can use
    • Berkeley, CA, USA: USENIX Association, [Online]. Available
    • P. Gutmann, “Plug-and-play PKI: a PKI your mother can use,” in Proceedings of the 12th conference on USENIX Security Symposium - Volume 12. Berkeley, CA, USA: USENIX Association, 2003, pp. 4-4. [Online]. Available: http://portal.acm.org/citation.cfm?id=1251353.1251357
    • (2003) Proceedings of the 12th conference on USENIX Security Symposium , vol.12 , pp. 4-4
    • Gutmann, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.