Given the value of imported counterfeit and pirated goods, the need for secure supply chain management is pertinent. Maleki et al. (HOST 2017) propose a new management scheme based on RFID tags (with 2-3K bits NVM) which, if compared to other schemes, is competitive on several performance and security metrics. Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag\u27s identity to each event such that an adversary is not able to impersonate the tag\u27s identity on another duplicate tag, a function with a weak form of unforgeability is needed. In this paper, we formally dene this security property, present three constructions (MULTIPLY-ADD, ADD-XOR, and S-...
Previous research studies mostly focused on enhancing the security of radio frequency identification...
Ray, BR ORCiD: 0000-0002-3016-1695Since the RFID technology has been found couple of decades ago, th...
This book considers the methods used by illicit manufactures and traders to introduce counterfeit go...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication...
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure ...
Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and ...
In this paper, we present an application of RFIDs for supply-chain management. In our application, w...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...
More than half a century after its inception, radiofrequency identification (RFID) technologies are ...
MasterCounterfeiting is one of the most serious problems in the consumer market.One promising approa...
While RFID systems are one of the key enablers helping the prototype of pervasive computer applicati...
Counterfeit products, especially in the pharmaceutical sector, have plagued the international commun...
Previous research studies mostly focused on enhancing the security of radio frequency identification...
Ray, BR ORCiD: 0000-0002-3016-1695Since the RFID technology has been found couple of decades ago, th...
This book considers the methods used by illicit manufactures and traders to introduce counterfeit go...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication...
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure ...
Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and ...
In this paper, we present an application of RFIDs for supply-chain management. In our application, w...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...
More than half a century after its inception, radiofrequency identification (RFID) technologies are ...
MasterCounterfeiting is one of the most serious problems in the consumer market.One promising approa...
While RFID systems are one of the key enablers helping the prototype of pervasive computer applicati...
Counterfeit products, especially in the pharmaceutical sector, have plagued the international commun...
Previous research studies mostly focused on enhancing the security of radio frequency identification...
Ray, BR ORCiD: 0000-0002-3016-1695Since the RFID technology has been found couple of decades ago, th...
This book considers the methods used by illicit manufactures and traders to introduce counterfeit go...