Xin et al., 2013 - Google Patents
An efficient privacy-preserving RFID ownership transfer protocolXin et al., 2013
- Document ID
- 1908601030978494379
- Author
- Xin W
- Guan Z
- Yang T
- Sun H
- Chen Z
- Publication year
- Publication venue
- Web Technologies and Applications: 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013. Proceedings 15
External Links
Snippet
RFID technology is increasingly become popular in supply chain management. When passing tags on to the next partner in the supply chain, ownership of the old partner is transferred to the new partner. In this paper, we first introduce some existing RFID tag …
- 238000005516 engineering process 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
- G06K19/07758—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
- G06K19/0776—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag the adhering arrangement being a layer of adhesive, so that the record carrier can function as a sticker
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dinarvand et al. | An efficient and secure RFID authentication protocol using elliptic curve cryptography | |
Pateriya et al. | The evolution of RFID security and privacy: A research survey | |
Song et al. | Scalable RFID security protocols supporting tag ownership transfer | |
He et al. | A strong user authentication scheme with smart cards for wireless communications | |
Kulseng et al. | Lightweight mutual authentication and ownership transfer for RFID systems | |
Jiang et al. | An efficient ticket based authentication protocol with unlinkability for wireless access networks | |
Xie et al. | Cloud-based RFID authentication | |
Li et al. | An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments | |
Yang | Across-authority lightweight ownership transfer protocol | |
Yang et al. | Protocol for ownership transfer across authorities: with the ability to assign transfer target | |
Khedr | SRFID: A hash-based security scheme for low cost RFID systems | |
Wang et al. | Comments on an advanced dynamic ID-based authentication scheme for cloud computing | |
Zhou et al. | A lightweight anti-desynchronization RFID authentication protocol | |
Sun et al. | A new design of wearable token system for mobile device security | |
Benssalah et al. | An efficient RFID authentication scheme based on elliptic curve cryptography for Internet of Things | |
Lee | Two ultralightweight authentication protocols for low-cost RFID tags | |
Li et al. | A hidden mutual authentication protocol for low‐cost RFID tags | |
Sadeghi et al. | Anonymizer-enabled security and privacy for RFID | |
Tewari et al. | A lightweight mutual authentication approach for RFID tags in IoT devices | |
Ryu et al. | On elliptic curve based untraceable RFID authentication protocols | |
Lo et al. | New mutual agreement protocol to secure mobile RFID-enabled devices | |
Xin et al. | An efficient privacy-preserving RFID ownership transfer protocol | |
Salem et al. | An elliptic curve-based lightweight mutual authentication scheme for secure communication in smart grids | |
Kardaş et al. | An efficient and private RFID authentication protocol supporting ownership transfer | |
Armknecht et al. | Anonymous authentication for RFID systems |