Tamper detection for ubiquitous RFID-enabled supply chain
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Wu, Chen | |
dc.contributor.author | Chang, Elizabeth | |
dc.date.accessioned | 2017-01-30T13:05:56Z | |
dc.date.available | 2017-01-30T13:05:56Z | |
dc.date.created | 2008-11-12T23:21:43Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Potdar, Vidyasagar and Wu, Chen and Chang, Elizabeth. 2005. : Tamper detection for ubiquitous RFID-enabled supply chain, in Hao, Y. and Liu, J. and Wang, Y. and Cheung, Y. and Yin, H. and Jiao, L. and Jiao, Y. and Ma, J. (ed), International Conference on Computational Ingelligence and Security (CIS 2005), Dec 15 2005, pp. 273-278. Xi'an, China: Springer-Verlag. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/28590 | |
dc.identifier.doi | 10.1007/11596981_40 | |
dc.description.abstract |
Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering. | |
dc.publisher | Springer-Verlag | |
dc.subject | RFID | |
dc.subject | middleware architecture | |
dc.subject | privacy | |
dc.subject | RFID tags | |
dc.subject | security | |
dc.subject | information sharing | |
dc.subject | secret information | |
dc.subject | tamper detection | |
dc.subject | data tampering | |
dc.subject | supply chain | |
dc.subject | information systems | |
dc.title | Tamper detection for ubiquitous RFID-enabled supply chain | |
dc.type | Conference Paper | |
dcterms.source.startPage | 273 | |
dcterms.source.endPage | 278 | |
dcterms.source.title | Computational Ingelligence and Security: International Conference, CIS 2005, Proceedings, Part II | |
dcterms.source.series | Computational Ingelligence and Security: International Conference, CIS 2005, Proceedings, Part II | |
dcterms.source.conference | International Conference on Computational Ingelligence and Security (CIS 2005) | |
dcterms.source.conference-start-date | Dec 15 2005 | |
dcterms.source.conferencelocation | Xi'an, China | |
dcterms.source.place | Berlin | |
curtin.note |
The original publication is available at: | |
curtin.note |
The link to the abstract is: | |
curtin.note |
| |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-572 | |
curtin.accessStatus | Fulltext not available | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |