2015 International Conference on Network and Information Systems for Computers 2015
DOI: 10.1109/icnisc.2015.48
|View full text |Cite
|
Sign up to set email alerts
|

A New Logistics Distribution Scheme Based on NFC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2018
2018
2019
2019

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 9 publications
0
4
0
1
Order By: Relevance
“…(2) Non-repudiation: In the information transmission process, if each identity is not authenticated, the sender and the receiver are vulnerable to being sent false information by an impersonation attack. Therefore, the non-repudiation of information is crucial to effectively prevent impersonation [4,12]. (3) Anonymity: It is easy for buyer and seller to disclose information in the goods delivery process.…”
Section: Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) Non-repudiation: In the information transmission process, if each identity is not authenticated, the sender and the receiver are vulnerable to being sent false information by an impersonation attack. Therefore, the non-repudiation of information is crucial to effectively prevent impersonation [4,12]. (3) Anonymity: It is easy for buyer and seller to disclose information in the goods delivery process.…”
Section: Requirementsmentioning
confidence: 99%
“…If a product is physical, the seller will entrust their logistics to deliver the goods to the buyer. As these logistics requirements grow, greater focus is required, not only on rapid delivery, but also on ensuring the integrity of goods and the privacy of personal information [2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…In this mode, it is a great advantageous that the RF domain of Non-contact card reader can supply power to NFC tags; so, the tag can work even the host device is out of battery. The NFC tag must be equipped with Security Element (SE for short) if it wants to apply the function of Card Emulation [8].…”
Section: Nfcmentioning
confidence: 99%
“…Currently, there are many disadvantages in logistic distribution schemes, such as consumer information errors. Also, the use of paper in recording consumer information is quite tricky because the courier must perform manual authentication data [8]. So with the e-KTP card can be used for authentication of data validity so that data used more accurate compared to manual recording.…”
Section: Introductionmentioning
confidence: 99%
“…Adicionalmente, los trabajos que se han desarrollado usan comunicación Ethernet a la base de datos y en este trabajo se usó tecnología inalámbrica wifi cuya implantación es no intrusiva a las instalaciones del centro de datos [11]. De manera similar, se han realizado trabajos de sistemas de acceso a hogares, oficinas, e incluso a vehículos, que usan teléfonos inteligentes para emular tarjetas NFC y lectores NFC PN532 [12] como el utilizado en este trabajo. En estos sistemas el usuario debe portar un teléfono inteligente para identificarse, lo cual no es factible ni es una opción en los centros de datos debido al costo y que en ocasiones los usuarios son visitantes.…”
Section: Introductionunclassified