The growing use of RFID in supply chains brings along an indisputable added value from the business perspective, but raises a number of new interesting security challenges. One of them is the authentication of two participants of the sup-ply chain that have possessed the same tagged item, but that have otherwise never communicated before. The situa-tion is even more complex if we imagine that participants to the supply chain may be business competitors. We present a novel cryptographic scheme that solves this problem. In our solution, users exchange tags over the cycle of a supply chain and, if two entities have possessed the same tag, they agree on a secret common key they can use to protect their exchange of business sensitive information...
In an RFID-enabled supply chain, where items are outfitted with RFID tags, path authentication based...
Trust management in an open RFID system environment is a nontrivial problem, where different organiz...
Previous research studies mostly focused on enhancing the security of radio frequency identification...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure ...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
RFID-enabled supply-chain systems are in an open-system environment, where different organisations h...
Part 12: Authentication and DelegationInternational audienceIn this paper, we propose a distributed ...
The use of RFID (Radio Frequency Identification) technology can be employed for tracking and detecti...
This paper presents a privacy-preserving path-authentication method for supply chain management usin...
Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and ...
In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication...
By attaching RFID tags to products, supply chain participants can identify products and create produ...
Since the RFID technology has been found couple of decades ago, there was much involvement of this e...
In an RFID-enabled supply chain, where items are outfitted with RFID tags, path authentication based...
Trust management in an open RFID system environment is a nontrivial problem, where different organiz...
Previous research studies mostly focused on enhancing the security of radio frequency identification...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure ...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
RFID-enabled supply-chain systems are in an open-system environment, where different organisations h...
Part 12: Authentication and DelegationInternational audienceIn this paper, we propose a distributed ...
The use of RFID (Radio Frequency Identification) technology can be employed for tracking and detecti...
This paper presents a privacy-preserving path-authentication method for supply chain management usin...
Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and ...
In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication...
By attaching RFID tags to products, supply chain participants can identify products and create produ...
Since the RFID technology has been found couple of decades ago, there was much involvement of this e...
In an RFID-enabled supply chain, where items are outfitted with RFID tags, path authentication based...
Trust management in an open RFID system environment is a nontrivial problem, where different organiz...
Previous research studies mostly focused on enhancing the security of radio frequency identification...