Li et al., 2011 - Google Patents
Secure and practical key distribution for RFID-enabled supply chainsLi et al., 2011
View PDF- Document ID
- 2834947948568404737
- Author
- Li T
- Li Y
- Wang G
- Publication year
- Publication venue
- International Conference on Security and Privacy in Communication Systems
External Links
Snippet
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure key distribution problem on a peer-to-peer base. In our model, we focus on any pair of consecutive parties along a supply chain, who agreed on a transaction and based on …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11038694B1 (en) | Devices, methods, and systems for cryptographic authentication and provenance of physical assets | |
| US11797683B2 (en) | Security chip with resistance to external monitoring attacks | |
| US11115209B2 (en) | Methods and systems for preparing and performing an object authentication | |
| Yang et al. | Mutual authentication protocol for low-cost RFID | |
| US20200106600A1 (en) | Progressive key encryption algorithm | |
| US8031875B1 (en) | Key distribution in unidirectional channels with applications to RFID | |
| Yang et al. | Security and privacy on authentication protocol for low-cost rfid | |
| CN110493006B (en) | Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and serial number | |
| Cortese et al. | Efficient and practical authentication of PUF-based RFID tags in supply chains | |
| CA3180770A1 (en) | System and methods for puf-based authentication | |
| Li et al. | Secure and practical key distribution for RFID-enabled supply chains | |
| Bu et al. | Every step you take, i’ll be watching you: Practical stepauth-entication of RFID paths | |
| Maleki et al. | New clone-detection approach for RFID-based supply chains | |
| Chen et al. | A secure RFID authentication protocol adopting error correction code | |
| Peris-Lopez et al. | Lightweight cryptography for low-cost RFID tags | |
| Cai et al. | Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains | |
| CN110912688B (en) | Anti-quantum-computation private key backup, loss reporting and recovery method and system based on alliance chain | |
| Li et al. | RFID Security at the Physical Level | |
| David | Lightweight cryptography for passive RFID tags | |
| Wang et al. | PGMAP: A privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards | |
| Cai et al. | Achieving high security and efficiency in RFID-tagged supply chains | |
| Duc et al. | Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning | |
| Wu et al. | Traceable and Verifiable Authorized Cloud-Assisted PSI-CA Protocol for Blockchain-Enabled Intelligent Logistics | |
| Kapoor et al. | Secret-sharing based secure communication protocols for passive rfids | |
| Cai | Security and Privacy in RFID-Enabled Supply Chains |