Show simple item record

dc.contributor.authorPotdar, Vidyasagar
dc.contributor.authorWu, Chen
dc.contributor.authorChang, Elizabeth
dc.date.accessioned2017-01-30T13:05:56Z
dc.date.available2017-01-30T13:05:56Z
dc.date.created2008-11-12T23:21:43Z
dc.date.issued2005
dc.identifier.citationPotdar, Vidyasagar and Wu, Chen and Chang, Elizabeth. 2005. : Tamper detection for ubiquitous RFID-enabled supply chain, in Hao, Y. and Liu, J. and Wang, Y. and Cheung, Y. and Yin, H. and Jiao, L. and Jiao, Y. and Ma, J. (ed), International Conference on Computational Ingelligence and Security (CIS 2005), Dec 15 2005, pp. 273-278. Xi'an, China: Springer-Verlag.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/28590
dc.identifier.doi10.1007/11596981_40
dc.description.abstract

Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering.

dc.publisherSpringer-Verlag
dc.subjectRFID
dc.subjectmiddleware architecture
dc.subjectprivacy
dc.subjectRFID tags
dc.subjectsecurity
dc.subjectinformation sharing
dc.subjectsecret information
dc.subjecttamper detection
dc.subjectdata tampering
dc.subjectsupply chain
dc.subjectinformation systems
dc.titleTamper detection for ubiquitous RFID-enabled supply chain
dc.typeConference Paper
dcterms.source.startPage273
dcterms.source.endPage278
dcterms.source.titleComputational Ingelligence and Security: International Conference, CIS 2005, Proceedings, Part II
dcterms.source.seriesComputational Ingelligence and Security: International Conference, CIS 2005, Proceedings, Part II
dcterms.source.conferenceInternational Conference on Computational Ingelligence and Security (CIS 2005)
dcterms.source.conference-start-dateDec 15 2005
dcterms.source.conferencelocationXi'an, China
dcterms.source.placeBerlin
curtin.note

The original publication is available at: http://www.springerlink.com

curtin.note

The link to the abstract is:

curtin.note

http://dx.doi.org/10.1007/11596981_40

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-572
curtin.accessStatusFulltext not available
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record