Tamper detection for ubiquitous RFID-enabled supply chain
Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to...
| Main Authors: | Potdar, Vidyasagar, Wu, Chen, Chang, Elizabeth |
|---|---|
| Format: | Conference Paper |
| Published: |
Springer-Verlag
2005
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/28590 |
Similar Items
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
The data integrity problem and multi-layered document integrity
by: Moss, Ben
Published: (2007)
by: Moss, Ben
Published: (2007)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Low-Cost RFID Identification Variation
by: Lin, K., et al.
Published: (2006)
by: Lin, K., et al.
Published: (2006)
Breach with Intent: A Risk Analysis of Deliberate Security Breaches in the Seafood Supply Chain
by: Forbes, David, et al.
Published: (2015)
by: Forbes, David, et al.
Published: (2015)
Passive RFID tag for biomass tracking and monitoring
of temperature and humidity level
by: Ali, Amjad
Published: (2024)
by: Ali, Amjad
Published: (2024)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Antecedents of Continuance Intention of RFID Technology in Western Australian Farms
by: Hossain, Mohammad, et al.
Published: (2012)
by: Hossain, Mohammad, et al.
Published: (2012)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Radio frequency identification (RFID) adoption: a cross-sectional comparison of voluntary and mandatory contexts
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Autonomous robot navigation and path following via
RFID tag detection
by: Castle-Green, Simon
Published: (2017)
by: Castle-Green, Simon
Published: (2017)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Impact of External Environmental Factors on RFID Adoption in Australian Livestock Industry: An Exploratory Study
by: Hossain, M., et al.
Published: (2010)
by: Hossain, M., et al.
Published: (2010)
Does Mandatory Pressure Increase RFID Adoption? A Case Study of Western Australian Livestock Industry
by: Hossain, Mohammad, et al.
Published: (2013)
by: Hossain, Mohammad, et al.
Published: (2013)
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Wireless multimedia sensor networks: a survey
by: Potdar, Vidyasagar, et al.
Published: (2009)
by: Potdar, Vidyasagar, et al.
Published: (2009)
Developing and validating a model explaining the assimilation process of RFID: An empirical study.
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Developing and validating a hierarchical model of external responsiveness: A study on RFID technology
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Applications of wireless sensor networks in pharmaceutical industry
by: Potdar, M., et al.
Published: (2009)
by: Potdar, M., et al.
Published: (2009)
Implementing RFID in China: A Critical Comparison between National and Foreign Owed Retailers
by: Wang, Luo
Published: (2011)
by: Wang, Luo
Published: (2011)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
An Automated Approach to Construction Site Layout Generation.
by: Akanmu, A., et al.
Published: (2014)
by: Akanmu, A., et al.
Published: (2014)
Spatial and Temporal Analysis on the Distribution of Active Radio-Frequency Identification (RFID) Tracking Accuracy with the Kriging Method
by: Liu, Xin, et al.
Published: (2014)
by: Liu, Xin, et al.
Published: (2014)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Evaluation of Radio Frequency Identification (RFID) technology as a tracking instrument in the supply chain of pharmaceutical products with a case study at ZLB Behring GmbH
by: Fischer, Thorsten
Published: (2005)
by: Fischer, Thorsten
Published: (2005)
Adoption, continued, and extended use of radio frequency identification (RFID) technology : Australian Livestock Industry
by: Mohammad Alamgir, Hossain
Published: (2012)
by: Mohammad Alamgir, Hossain
Published: (2012)
A Middleware for Mobile and Ubiquitous Learning Ecosystems Based on a Reconfigurable Plug-and-Play Architecture: Application to Mashups
by: Martin, S., et al.
Published: (2010)
by: Martin, S., et al.
Published: (2010)
Information and knowledge leakage in supply chain
by: Tan, Kim Hua, et al.
Published: (2016)
by: Tan, Kim Hua, et al.
Published: (2016)
Manufacturing and Logistics Information Systems
by: Wood, Lincoln, et al.
Published: (2015)
by: Wood, Lincoln, et al.
Published: (2015)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Similar Items
-
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006) -
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006) -
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008) -
The data integrity problem and multi-layered document integrity
by: Moss, Ben
Published: (2007)