A Musa, AAA Dabo - Global journal of flexible systems management, 2016 - Springer
This paper presents a systematic literature review of papers that were published in academic journals on the applications of radio frequency identification (RFID) in supply …
S Sundaresan, R Doss, W Zhou, S Piramuthu - Computer Communications, 2015 - Elsevier
In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing …
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote …
H Niu, E Taqieddin… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Providing security in passive RFID systems has gained significant attention due to their widespread use. Research has focused on providing both location and data privacy through …
AK Manjulata - … Journal of Communication Networks and Information …, 2014 - academia.edu
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor …
Radio frequency identification (RFID) is a modern approach to identify and track several assets at once in a supply chain environment. In many RFID applications, tagged items are …
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric …