Trust and Radio Frequency Identification (RFID) Adoption within an Alliance
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
Extending the EPC network: the potential of RFID in anti-counterfeiting
Proceedings of the 2005 ACM symposium on Applied computing
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
Product Specific Security Features Based on RFID Technology
SAINT-W '06 Proceedings of the International Symposium on Applications on Internet Workshops
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
A Trust Framework for Pervasive Computing Environments
AICCSA '06 Proceedings of the IEEE International Conference on Computer Systems and Applications
RFID Authentication Protocol Using Synchronized Secret Information
ISDPE '07 Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce
RFID Security Protocol by Lightweight ECC Algorithm
ALPIT '07 Proceedings of the Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007)
RFID Infrastructure Design: A Case Study of Two Australian RFID Projects
IEEE Internet Computing
Reverse-engineering a cryptographic RFID tag
SS'08 Proceedings of the 17th conference on Security symposium
iTrust'05 Proceedings of the Third international conference on Trust Management
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Hi-index | 0.00 |
RFID-enabled supply-chain systems are in an open-system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. Besides that, counterfeiting is a challenging issue in RFID Supply-Chain Management (SCM). On the basis of the analysis of traditional trust framework in SCM, this paper proposes a seven-layer RFID trust framework. An example of integration of our trust framework with SCM systems is presented. Taxonomy of cloning threats and solutions is also presented.