In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication problem in supply chains. RFID tags have been widely used as a low-cost wireless method for detecting counterfeit product injection in supply chains. We open a new direction toward solving this problem by using the Non-Volatile Memory (NVM) of recent RFID tags. We propose a method based on this direction that significantly improves the availability of the system and costs less. In our method, we introduce the notion of Software Unclonability, which is a kind of one-time MAC for authenticating random inputs. Also, we introduce three lightweight constructions that are software unclonable. Second, we focus on OpenStack that is a prestigious ope...
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much inter...
Cloud-based radio frequency identification (RFID) is an emerging solution for supply chain systems t...
[[abstract]]In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to p...
In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication...
Given the value of imported counterfeit and pirated goods, the need for secure supply chain manageme...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
In addition to its benefits, the Internet of Things (IoT) technology has also opened the way to nove...
[[abstract]]The use of radio frequency identification (RFID) in Internet of things (IoT) has led to ...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...
Low-cost RFID tags are already being used for supply chain management and are a promising new techno...
[[abstract]]For providing secure network environments, many authentication schemes have been propose...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
Radio frequency identification (RFID) is an important technique used for automatic identification an...
Trust management in an open RFID system environment is a nontrivial problem, where different organiz...
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much inter...
Cloud-based radio frequency identification (RFID) is an emerging solution for supply chain systems t...
[[abstract]]In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to p...
In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication...
Given the value of imported counterfeit and pirated goods, the need for secure supply chain manageme...
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By atta...
In addition to its benefits, the Internet of Things (IoT) technology has also opened the way to nove...
[[abstract]]The use of radio frequency identification (RFID) in Internet of things (IoT) has led to ...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifi...
The growing use of RFID in supply chains brings along an indisputable added value from the business ...
Low-cost RFID tags are already being used for supply chain management and are a promising new techno...
[[abstract]]For providing secure network environments, many authentication schemes have been propose...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
Radio frequency identification (RFID) is an important technique used for automatic identification an...
Trust management in an open RFID system environment is a nontrivial problem, where different organiz...
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much inter...
Cloud-based radio frequency identification (RFID) is an emerging solution for supply chain systems t...
[[abstract]]In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to p...