EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
RFID mutual authentication protocols
Decision Support Systems
Hi-index | 0.00 |
RFID-tagged items in a supply chain experience different types of ownerships, often simultaneously, throughout their lifetime. We consider scenarios related to ownership of RFID tags in a supply chain, specifically the seamless incorporation of third party logistics provider. We develop protocol for authentication of RFID-tagged items under such conditions.