Abstract—We investigate an application of Radio Frequency Identification (RFID) referred to in the literature as group scanning, in which an RFID reader device interrogates several RFID tags to establish “simultaneous ” presence of a group of tags. Our goal is to study the group scanning problem in strong adversarial settings and show how group scanning can be used in distributed applications for supply chain management. We present a security framework for group scanning and give a formal description of the attending security requirements. Our model is based on the Universal Composability framework and supports re-usability (through modularity of security guarantees). We propose two novel protocols that realize group scanning in this securi...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
In many fields, multiple RFID tags are often combined into a group to identify an object. An RFID gr...
AbstractRFID technology is widely used in various areas and found to be very useful in the business ...
We investigate an application of RFIDs referred to in the literature as group scanning, in which sev...
The adoption of RFID (Radio Frequency Identification) technology has greatly improved the efficiency...
The integrity of shipments in the supply chain may have to be tracked remotely by carriers that are ...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
RFID (Radio Frequency Identification) technology enables readers to scan remote RFID tags, and label...
RFID tag is a small and inexpensive microchip which is capable of transmitting unique identifier thr...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...
Part 12: Authentication and DelegationInternational audienceIn this paper, we propose a distributed ...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
RFID-enabled supply-chain systems are in an open-system environment, where different organisations h...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
In many fields, multiple RFID tags are often combined into a group to identify an object. An RFID gr...
AbstractRFID technology is widely used in various areas and found to be very useful in the business ...
We investigate an application of RFIDs referred to in the literature as group scanning, in which sev...
The adoption of RFID (Radio Frequency Identification) technology has greatly improved the efficiency...
The integrity of shipments in the supply chain may have to be tracked remotely by carriers that are ...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
RFID (Radio Frequency Identification) technology enables readers to scan remote RFID tags, and label...
RFID tag is a small and inexpensive microchip which is capable of transmitting unique identifier thr...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...
Part 12: Authentication and DelegationInternational audienceIn this paper, we propose a distributed ...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
RFID-enabled supply-chain systems are in an open-system environment, where different organisations h...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
In many fields, multiple RFID tags are often combined into a group to identify an object. An RFID gr...
AbstractRFID technology is widely used in various areas and found to be very useful in the business ...