SecTTS: A secure track & trace system for RFID-enabled supply chains

J Shi, Y Li, W He, D Sim - Computers in Industry, 2012 - Elsevier
Due to the highly sensitive business information communicated within RFID-enabled supply
chain networks, there is an urgent need for a secure and effective track & trace system. In …

[图书][B] RFID security and privacy

Y Li, RH Deng, E Bertino - 2014 - Springer
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry
infant to an energetic teenager during recent years. Much of the exciting development in this …

Adopting hyperledger fabric blockchain for epcglobal network

PHT Chua, Y Li, W He - 2019 IEEE International Conference on …, 2019 - ieeexplore.ieee.org
The EPCglobal Network is a computer network used to share product data between trading
partners. The EPC Information Services (EPCIS) is an event record repository that allows …

Evaluation of different electronic product code discovery service models

SM Kywe, J Shi, Y Li, R Kailash - Advances in Internet of …, 2012 - ink.library.smu.edu.sg
Abstract Electronic Product Code Discovery Service (EPCDS) is an important concept in
supply chain processes and in Internet of Things (IOT). It allows supply chain participants to …

Dynamic tree bitmap for IP lookup and update

S Sahni, H Lu - Sixth International Conference on Networking …, 2007 - ieeexplore.ieee.org
We propose a data structure-dynamic tree bitmap-for the representation of dynamic IP router
tables that must support very high lookup and update rates. In fact, the dynamic tree bitmap …

RNS-a public resource name service platform for the internet of things

Y Tian, Y Liu, Z Yan, S Wu, H Li - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Name service is one of the most important parts for ID/Resource management in Internet of
Things (IoT). Many countries and organizations have designed different naming schemes to …

SALS: semantics-aware location sharing based on cloaking zone in mobile social networks

Y Che, K Chiew, X Hong, Q He - Proceedings of the First ACM …, 2012 - dl.acm.org
There is a potential privacy breach when users access various location-based social
applications on a mobile social network (MSN), eg, sharing locations with friends. To …

Efficient key management for IOT owner in the cloud

Z Cui, H Lv, C Yin, G Gao… - 2015 IEEE fifth …, 2015 - ieeexplore.ieee.org
IOT (internet of things) owner may not want their sensitive data to be public in the cloud.
However, the client operated by IOT owner may be too lightweight to provide the …

Architectural model for Collaboration in The Internet of Things: a Fog Computing based approach

J Abdelaziz - 2018 - constellation.uqac.ca
Through sensors, actuators and other Internet-connected devices, applications and services
are becoming able to perceive and react on the real world. Seamlessly integrating people …

Analyzing and controlling information inference of fine-grained access control policies in relational databases

J Shi, G Fu, J Weng, H Zhu - 2013 Fourth International …, 2013 - ieeexplore.ieee.org
As a more flexible and effective access control mechanism in databases, fine-grained
access control (FGAC) has drawn considerable attention from industrial and research …