Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains
“Symmetric secret”-based RFID systems are widely adopted in supply chains. In such RFID systems, a reader’s ability to identify a RFID tag relies on the possession of the tag’s secret which is usually only known by its owner. If a “symmetric secret”-based RFID system is deployed in third party logis...
Saved in:
Main Authors: | CAI, Shaoying, SU, Chunhua, LI, Yingjiu, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1337 https://ink.library.smu.edu.sg/context/sis_research/article/2336/viewcontent/protecting_and_restraining_the_3rd_party_in_rfid_enables_3pl_supply_chains.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
by: CAI, Shaoying, et al.
Published: (2012) -
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains
by: CAI, Shaoying, et al.
Published: (2009) -
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
by: CAI, Shaoying, et al.
Published: (2009) -
Malware protection on RFID-enabled supply chain management systems in the EPCglobal network
by: YAN, Qiang, et al.
Published: (2013) -
Protecting RFID Communications in Supply Chains
by: LI, Yingjiu, et al.
Published: (2006)