NTRU: A Ring-Based Public Key Cryptosystem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
An anti-counterfeiting RFID privacy protection protocol
Journal of Computer Science and Technology
RFID as enabler for the boundless real-time organisation: empirical insights from Germany
International Journal of Networking and Virtual Organisations
RFID tag for Halal food tracking in Malaysia: users perceptions and opportunities
TELE-INFO'08 Proceedings of the 7th WSEAS International Conference on Telecommunications and Informatics
With anti-counterfeit ownership transfer for RFID system
ELECTROSCIENCE'08 Proceedings of the 6th WSEAS International Conference on Applied Electromagnetics, Wireless and Optical
Anti-counterfeit ownership transfer protocol for low cost RFID system
WSEAS Transactions on Computers
WSEAS Transactions on Information Science and Applications
Information Systems Frontiers
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Anti-counterfeiting Using Memory Spots
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
Radio frequency identification: a case study of healthcare organisations
International Journal of Security and Networks
Assessing and optimizing the range of UHF RFID to enable real-world pervasive computing applications
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Autonomic tracing of production processes with mobile and agent-based computing
Information Sciences: an International Journal
Privacy-preserving pattern matching for anomaly detection in RFID anti-counterfeiting
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Implementation issues in RFID-based anti-counterfeiting systems
Computers in Industry
Public-key encrypted bloom filters with applications to supply chain integrity
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
A robust and secure RFID-based pedigree system (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Shoehorning security into the EPC tag standard
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Formal verification of a key establishment protocol for EPC gen2 RFID systems: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
A cross-national comparison of perceived strategic importance of RFID for CIOs in Germany and Italy
International Journal of Information Management: The Journal for Information Professionals
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Hi-index | 0.00 |
The International Chamber of Commerce estimates that seven percent of the world trade is in counterfeit goods, with the counterfeit market being worth 500 billion USD in 2004. Many companies already use overt anti-counterfeiting measures like holograms to confine counterfeiting and product piracy. However, current techniques are not suited for automated tests of product authenticity as required in warehouses, or do not provide the required level of security. In this context, Radio Frequency Identification (RFID) is a promising approach, providing an extensible, flexible and secure measure against counterfeiting. Unique product identification numbers together with an infrastructure to seamlessly share RFID-related data over the Internet are a basis of efficient Track & Trace applications. An emerging infrastructure is the EPC Network, which can be used to provide pedigree information of products and makes plausibility checks possible. In this paper, we propose a solution for products requiring authentication mechanisms that go beyond track & trace. Therefore, the evolving EPC Network should comprehend the functionality to handle tags which support strong cryptography. We suggest extending the upcoming EPC Network infrastructure with an EPC Product Authentication Service. Moreover, the development of cost-effective, dedicated authentication devices as well as the belonging standardization is motivated.