By Topic

Supply chain control using a RFID proxy re-signature scheme

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Burbridge, T. ; BT Res., Ipswich, UK ; Soppera, A.

The use of RFID tags allows many new approaches to the old problems of supply chain control and product anti-counterfeiting. Many of the schemes suggested to-date do not adequately meet the needs of the supply chain industry. Some require unjustifiable expense or performance and resilience issues, while others face deployment barriers where the party that deploys the technology is not the party the benefits. Many of the schemes, however, will ultimately fail because they inadequately address the issues of trust and business confidentiality. We present a supply chain control solution using the principle of proxy re-signatures to establish secure and verifiable supply chain paths. Critically our scheme does not require centralized run-time services and provides minimal visibility of supply chain operations to other parties.

Published in:

RFID, 2010 IEEE International Conference on

Date of Conference:

14-16 April 2010