Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag's identity to each event such that an adversary is not able to impersonate the tag's identity on another duplicate tag, a function with a weak form of unforgeability is needed.
Dec 21, 2017
This paper focuses on the most recent state-of-the-art proposal by Maleki et al. [2] for secure supply chain management based on RFID tags. Previous schemes.
Dec 7, 2018 · Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag's ...
Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag's identity to each ...
Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag's identity to each ...
Weak-Unforgeable Tags for Secure Supply Chain Management · List of references · Publications that cite this publication.
Marten van Dijk , Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr: Weak-Unforgeable Tags for Secure Supply Chain Management.
People also ask
What is Rfid in supply chain management?
What are the four types of risk in supply chain management?
What is the dot code for supply chain management?
How to mitigate supply chain management?
Weak-unforgeable tags for secure supply chain management. M van Dijk, C Jin, H Maleki, P Ha Nguyen, R Rahaeimehr. Financial Cryptography and Data Security ...
Weak-Unforgeable Tags for Secure Supply Chain Management. Conference Paper. Full-text available. Feb 2018. Marten van Dijk · Chenglu Jin ...
Weak-Unforgeable Tags for Secure Supply Chain Management. R Rahaeimehr. Financial Cryptography and Data Security: 22nd International Conference, FC …, 2019.