Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag's identity to each event such that an adversary is not able to impersonate the tag's identity on another duplicate tag, a function with a weak form of unforgeability is needed.
Dec 21, 2017
This paper focuses on the most recent state-of-the-art proposal by Maleki et al. [2] for secure supply chain management based on RFID tags. Previous schemes.
Dec 7, 2018 · Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag's ...
Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag's identity to each ...
Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag's identity to each ...
Weak-Unforgeable Tags for Secure Supply Chain Management · List of references · Publications that cite this publication.
Marten van Dijk , Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr: Weak-Unforgeable Tags for Secure Supply Chain Management.
People also ask
Weak-unforgeable tags for secure supply chain management. M van Dijk, C Jin, H Maleki, P Ha Nguyen, R Rahaeimehr. Financial Cryptography and Data Security ...
Weak-Unforgeable Tags for Secure Supply Chain Management. Conference Paper. Full-text available. Feb 2018. Marten van Dijk · Chenglu Jin ...
Weak-Unforgeable Tags for Secure Supply Chain Management. R Rahaeimehr. Financial Cryptography and Data Security: 22nd International Conference, FC …, 2019.