BEST : a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain
Radio Frequency Identification (RFID) technique is gaining increasing popularity in supply chain for the product management. By attaching a tag to each product, a reader can employ an authentication protocol to interrogate the tag's information for verification, which facilitates the automatic...
Saved in:
Main Authors: | Qi, Saiyu., Lu, Li., Li, Zhenjiang., Li, Mo. |
---|---|
Other Authors: | School of Computer Engineering |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/84238 http://hdl.handle.net/10220/12379 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
by: CAI, Shaoying, et al.
Published: (2012) -
Batch Clone Detection for RFID-enabled Supply Chain
by: SHI, Jie, et al.
Published: (2014) -
Secure and Practical Key Distribution for RFID-Enabled Supply Chains
by: LI, Tieyan, et al.
Published: (2011) -
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains
by: CAI, Shaoying, et al.
Published: (2009) -
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
by: CAI, Shaoying, et al.
Published: (2009)