An RFID-based smart structure for the supply chain: Resilient scanning proofs and ownership transfer with positive secrecy capacity channels
The National Strategy for Global Supply Chain Security published in 2012 by the White
House identifies two primary goals for strengthening global supply chains: first, to promote …
House identifies two primary goals for strengthening global supply chains: first, to promote …
ProTaR: Probabilistic tag retardation for missing tag identification in large-scale RFID systems
Radio frequency identification (RFID) technology provides a promising solution to the
problem of missing object identification in large-scale systems, such as warehouses and …
problem of missing object identification in large-scale systems, such as warehouses and …
An anonymous RFID grou**-proof with missing tag identification
The emergence of RFID (Radio Frequency Identification) technology has greatly increased
the efficiency for inventory control, supply-chain management and logistics. With RFID group …
the efficiency for inventory control, supply-chain management and logistics. With RFID group …
Using the Chinese remainder theorem for the grou** of RFID tags
YS Su, OK Tonguz - IEEE transactions on communications, 2013 - ieeexplore.ieee.org
In this paper, we propose a novel scheme for the design of grou** of radio-frequency
identification (RFID) tags, based on the Chinese remainder theorem (CRT). Grou** allows …
identification (RFID) tags, based on the Chinese remainder theorem (CRT). Grou** allows …
Extended grou** of RFID tags based on resolvable transversal designs
YS Su - IEEE Signal Processing Letters, 2014 - ieeexplore.ieee.org
This letter presents a novel scheme for the design of extended grou** of radio-frequency
identification (RFID) tags, based on resolvable transversal designs (RTDs). Extended …
identification (RFID) tags, based on resolvable transversal designs (RTDs). Extended …
Grou** of RFID tags via strongly selective families
YS Su, JR Lin, OK Tonguz - IEEE communications letters, 2013 - ieeexplore.ieee.org
This letter proposes a novel scheme for grou** of radio-frequency identification (RFID)
tags, based on strongly selective families (SSFs). Grou** of RFID tags allows verifying the …
tags, based on strongly selective families (SSFs). Grou** of RFID tags allows verifying the …
Design and analysis of unequal missing protection for the grou** of RFID tags
YS Su, CH Wang - IEEE Transactions on Communications, 2015 - ieeexplore.ieee.org
In this paper, we address the issue of unequal missing protection (UMP) for the design of
grou** of radio-frequency identification (RFID) tags. While relying on group generation …
grou** of radio-frequency identification (RFID) tags. While relying on group generation …
Tag memory-erasure tradeoff of RFID grou** codes
We analyze the memory-erasure tradeoff of recently proposed radio frequency identification
(RFID) grou** codes. Grou** codes make it possible for an RFID reader to automatically …
(RFID) grou** codes. Grou** codes make it possible for an RFID reader to automatically …
EraRFID: Reliable RFID systems using erasure coding
NB Mabrouk, P Couderc - 2015 IEEE International Conference …, 2015 - ieeexplore.ieee.org
Current RFID systems are not utterly reliable as they may fail to read all the tags present in
their RF field of view, particularly when dealing with bulk tag reading in messy situations. To …
their RF field of view, particularly when dealing with bulk tag reading in messy situations. To …
Who stole my cheese?: Verifying intactness of anonymous RFID systems
Abstract Radio-Frequency Identification (RFID) technology has fostered many object
monitoring applications. Along with this trend, a corresponding important problem is to verify …
monitoring applications. Along with this trend, a corresponding important problem is to verify …