{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:10:58Z","timestamp":1748664658737,"version":"3.41.0"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319248363"},{"type":"electronic","value":"9783319248370"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24837-0_3","type":"book-chapter","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T05:32:34Z","timestamp":1443072754000},"page":"32-49","source":"Crossref","is-referenced-by-count":5,"title":["ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devices"],"prefix":"10.1007","author":[{"given":"Kun","family":"Yang","sequence":"first","affiliation":[]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"3_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1201\/1078\/44912.22.1.20051201\/85739.7","volume":"22","author":"R. Angeles","year":"2005","unstructured":"Angeles, R.: RFID Technologies: Supply-chain Applications and Implementation Issues. Information Systems Management\u00a022(1), 51\u201365 (2005)","journal-title":"Information Systems Management"},{"key":"3_CR2","first-page":"41","volume-title":"Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008","author":"F. Armknecht","year":"2008","unstructured":"Armknecht, F., Gasmi, Y., Sadeghi, A.-R., Stewin, P., Unger, M., Ramunno, G., Vernizzi, D.: An efficient implementation of trusted channels based on openSSL. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, pp. 41\u201350. ACM, New York (2008)"},{"issue":"1","key":"3_CR3","first-page":"24","volume":"15","author":"Z. Asif","year":"2005","unstructured":"Asif, Z.: Integrating the Supply Chain with RFID: a Technical and Business Analysis. Communications of the Association for Information Systems\u00a015(1), 24 (2005)","journal-title":"Communications of the Association for Information Systems"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-28879-1_1","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"G. Avoine","year":"2012","unstructured":"Avoine, G.: Privacy challenges in RFID. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol.\u00a07122, pp. 1\u20138. Springer, Heidelberg (2012)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/11941378_25","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"J. Buchmann","year":"2006","unstructured":"Buchmann, J., Garc\u00eda, L.C.C., Dahmen, E., D\u00f6ring, M., Klintsevich, E.: CMSS \u2013 an improved merkle signature scheme. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 349\u2013363. Springer, Heidelberg (2006)"},{"key":"3_CR6","unstructured":"Carbone, J.: Most Counterfeit Parts Involve Obsolete Semiconductors and Other EOL Components. The Source, August 2012"},{"issue":"2","key":"3_CR7","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H.-Y. Chien","year":"2007","unstructured":"Chien, H.-Y., Chen, C.-H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces\u00a029(2), 254\u2013259 (2007)","journal-title":"Computer Standards & Interfaces"},{"key":"3_CR8","unstructured":"Devadas, S., Yu, M.: Secure and Robust Error Correction for Physical Unclonable Functions"},{"key":"3_CR9","unstructured":"Dierks, T.: The Transport Layer Security (TLS) Protocol Version 1.2"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Ekinci, Y., Ekinci, O., Giinaydin, U.: The application of UHF passive RFID technology for the effectiveness of retail\/consumer goods supply chain management. In: 2007 1st Annual RFID Eurasia, pp. 1\u20136, September 2007","DOI":"10.1109\/RFIDEURASIA.2007.4368106"},{"key":"3_CR11","unstructured":"Evans, D.: The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. CISCO white paper 1 (2011)"},{"key":"3_CR12","unstructured":"FreightWatch International Supply Chain Intelligence Center. 2013 Global Cargo Theft Threat Assessment (2013)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM (2002)","DOI":"10.1145\/586110.586132"},{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1111\/j.1937-5956.2007.tb00166.x","volume":"16","author":"G.M. Gaukler","year":"2007","unstructured":"Gaukler, G.M., Seifert, R.W., Hausman, W.H.: Item-Level RFID in the Retail Supply Chain. Production and Operations Management\u00a016(1), 65\u201376 (2007)","journal-title":"Production and Operations Management"},{"issue":"2","key":"3_CR15","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-message Attacks. SIAM Journal on Computing\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Hancke, G.P.: RFID and contactless technology. In: Smart Cards, Tokens, Security and Applications, pp. 295\u2013322. Springer (2008)","DOI":"10.1007\/978-0-387-72198-9_13"},{"issue":"9","key":"3_CR17","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"D. Holcomb","year":"2009","unstructured":"Holcomb, D., Burleson, W., Fu, K.: Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers\u00a058(9), 1198\u20131210 (2009)","journal-title":"IEEE Transactions on Computers"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Hosey, A., Rahman, M., Xiao, K., Forte, D., Tehranipoor, M., et al.: Advanced analysis of cell stability for reliable SRAM PUFs. In: 2014 IEEE 23rd Asian Test Symposium (ATS), pp. 348\u2013353. IEEE (2014)","DOI":"10.1109\/ATS.2014.70"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Huang, H.-C., Chang, F.-C., Fang, W.-C.: Reversible Data Hiding with Histogram-based Difference Expansion for QR Code Applications 57, 779\u2013787","DOI":"10.1109\/TCE.2011.5955222"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-74735-2_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"M. Hutter","year":"2007","unstructured":"Hutter, M., Mangard, S., Feldhofer, M.: Power and EM attacks on passive 13.56 MHz RFID devices. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 320\u2013333. Springer, Heidelberg (2007)"},{"key":"3_CR21","unstructured":"Inc., E. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.2.0, May 2008"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Juels, A., Pappu, R., Parno, B.: Unidirectional key distribution across time and space with applications to rfid security. In: USENIX Security Symposium, pp. 75\u201390 (2008)","DOI":"10.1145\/1352533.1352534"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.-J., Tuyls, P.: The butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, pp. 67\u201370. IEEE (2008)","DOI":"10.1109\/HST.2008.4559053"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-01516-8_20","volume-title":"Pervasive Computing","author":"M. Lehtonen","year":"2009","unstructured":"Lehtonen, M., Ostojic, D., Ilic, A., Michahelles, F.: Securing RFID systems by detecting tag cloning. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol.\u00a05538, pp. 291\u2013308. Springer, Heidelberg (2009)"},{"issue":"2","key":"3_CR25","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/JSYST.2007.909820","volume":"1","author":"M.O. Lehtonen","year":"2007","unstructured":"Lehtonen, M.O., Michahelles, F., Fleisch, E.: Trust and Security in RFID-based Product Authentication Systems. IEEE Systems Journal\u00a01(2), 129\u2013144 (2007)","journal-title":"IEEE Systems Journal"},{"key":"3_CR26","unstructured":"Livingston, H.: Couterfeit Incident Reporting Trends \u2013 Observations in Anticipation of Forthcoming Regulations, August 2013. http:\/\/counterfeitparts.wordpress.com\/2013\/08\/06\/counterfeit-incident-reporting-trends-observations-in-anticipation-of-forthcoming-regulations\/"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-04138-9_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"R. Maes","year":"2009","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Low-overhead Implementation of a soft decision helper data algorithm for SRAM PUFs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 332\u2013347. Springer, Heidelberg (2009)"},{"issue":"2","key":"3_CR28","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s00145-010-9088-4","volume":"24","author":"A. Maiti","year":"2011","unstructured":"Maiti, A., Schaumont, P.: Improved Ring Oscillator PUF: an FPGA-friendly Secure Primitive. Journal of Cryptology\u00a024(2), 375\u2013397 (2011)","journal-title":"Journal of Cryptology"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Michael, K., McCathie, L.: The pros and cons of RFID in supply chain management. In: International Conference on Mobile Business, ICMB 2005, pp. 623\u2013629. IEEE (2005)","DOI":"10.1109\/ICMB.2005.103"},{"key":"3_CR30","unstructured":"Mitchell, B.: Network Engineer Charged in Multi-Million Dollar Cisco Equipment Theft, December 2011. http:\/\/compnetworking.about.com\/b\/2011\/12\/10\/network-engineer-charged-in-multimillion-dollar-cisco-equipment-thef.htm"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, D., Chakraborty, R.S., Nguyen, P.H., Sahoo, D.P.: Tutorial T7: Physically unclonable function: A promising security primitive for internet of things. In: 28th International Conference on VLSI Design (VLSID), pp. 14\u201315. IEEE (2015)","DOI":"10.1109\/VLSID.2015.115"},{"key":"3_CR32","unstructured":"NXP Semiconductors. I2C Bus Specification and User Manual, April 2014"},{"key":"3_CR33","unstructured":"Rabin, M.O.: Digitalized Signatures and Public-key Functions as Intractable as Factorization. Tech. rep., DTIC Document (1979)"},{"key":"3_CR34","unstructured":"Roberti, M.: How Can an RFID Reader Interrogate Multiple Tags Simultaneously? September 2010. http:\/\/www.rfidjournal.com\/blogs\/experts\/entry?7853"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Rocholl, J., Klenk, S., Heidemann, G.: Robust 1D barcode recognition on mobile devices. In: 2010 20th International Conference on Pattern Recognition (ICPR), pp. 2712\u20132715, August 2010","DOI":"10.1109\/ICPR.2010.664"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Schrijen, G.-J., van der Leest, V.: Comparative analysis of SRAM memories used as PUF primitives. In: Proceedings of the Conference on Design, Automation and Test in Europe, EDA Consortium, pp. 1319\u20131324 (2012)","DOI":"10.1109\/DATE.2012.6176696"},{"issue":"6","key":"3_CR37","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1002\/dac.2411","volume":"26","author":"Z. Tariguliyev","year":"2013","unstructured":"Tariguliyev, Z., Ors, B.: Reliability and Security of Arbiter-based Physical Unclonable Function Circuits. International Journal of Communication Systems\u00a026(6), 757\u2013769 (2013)","journal-title":"International Journal of Communication Systems"},{"key":"3_CR38","unstructured":"Waters, A.: The Case of the Great Router Robbery, May 2011. http:\/\/resources.infosecinstitute.com\/router-robbery\/"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Xiao, K., Rahman, T., Forte, D., Tehranipoor, M., Huang, Y., Su, M.: Bit Selection algorithm suitable for high-volumn production of SRAM PUF. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST ) (2014)","DOI":"10.1109\/HST.2014.6855578"},{"key":"3_CR40","unstructured":"Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol. In: Workshop on RFID and Lightweight Crypto (2005)"},{"key":"3_CR41","unstructured":"Zanetti, D., Capkun, S., Juels, A.: Tailing RFID tags for clone detection. In: Network and Distributed System Security Symposium (2013)"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Zanetti, D., Fellmann, L., Capkun, S.: Privacy-preserving clone detection for RFID-enabled supply chains. In: IEEE International Conference on RFID, pp. 37\u201344. IEEE (2010)","DOI":"10.1109\/RFID.2010.5467257"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification. Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24837-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T19:53:03Z","timestamp":1748634783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24837-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319248363","9783319248370"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24837-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}