Much research has been done on preserving RFID tag owner\u27s location privacy. This research has produced various RFID tag ownership transfer protocols. Since these protocols operate across various entities in a distributed manner, they should exhibit ownership atomicity. More often than not, ownership transfer could precede or succeed payment transfer. In this paper, we introduce a novel commerce environment, RFCommerce and present a payment atomic protocol, TagPay that facilitates payments and ownership transfers in it. We analyze important properties of TagPay and prove their validity using model checking. © 2010 IEEE
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag e...
Radio Frequency Identification (RFID) technique is gaining increasing popularity in supply chain for...
Abstract. We present a formal model for stateful security protocols. This model is used to define ow...
Much research has been done on preserving RFID tag owner\u27s location privacy. This research has pr...
RFID technology is increasingly become popular in supply chain management. When passing tags on to t...
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of t...
Existing business models require RFID tag to transfer its ownership during its life cycle. As a resu...
Abstract: While a major of existing RFID security protocols address tag authentication issues, the a...
In the RFID system a tag is attached to an object which might own by a number of people during its l...
Radio Frequency Identification (RFID) has been widely adopted in practice for objects identification...
In the real society, the owner of a tagged object may transfer its ownership to another party. An ow...
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated agai...
Radio frequency identification (RFID) is a modern approach to identify and track several assets at o...
In RFID system a tag is attached to an object which might own by a number of owners during its life ...
[[abstract]]Due to the advancement of convenience technology for people, the era of Internet of Thin...
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag e...
Radio Frequency Identification (RFID) technique is gaining increasing popularity in supply chain for...
Abstract. We present a formal model for stateful security protocols. This model is used to define ow...
Much research has been done on preserving RFID tag owner\u27s location privacy. This research has pr...
RFID technology is increasingly become popular in supply chain management. When passing tags on to t...
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of t...
Existing business models require RFID tag to transfer its ownership during its life cycle. As a resu...
Abstract: While a major of existing RFID security protocols address tag authentication issues, the a...
In the RFID system a tag is attached to an object which might own by a number of people during its l...
Radio Frequency Identification (RFID) has been widely adopted in practice for objects identification...
In the real society, the owner of a tagged object may transfer its ownership to another party. An ow...
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated agai...
Radio frequency identification (RFID) is a modern approach to identify and track several assets at o...
In RFID system a tag is attached to an object which might own by a number of owners during its life ...
[[abstract]]Due to the advancement of convenience technology for people, the era of Internet of Thin...
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag e...
Radio Frequency Identification (RFID) technique is gaining increasing popularity in supply chain for...
Abstract. We present a formal model for stateful security protocols. This model is used to define ow...