2018
DOI: 10.1109/jiot.2017.2752239
|View full text |Cite
|
Sign up to set email alerts
|

Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 39 publications
(15 citation statements)
references
References 31 publications
0
15
0
Order By: Relevance
“…Fast identifying the missing tags is critical to avoid substantial economic losses. The solutions to missing tag identification can be classified into two categories: ID collection protocol [9], [10], [14], [18]- [20] and missing tag identification protocol [3], [11]- [13], [15], [16], [21].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Fast identifying the missing tags is critical to avoid substantial economic losses. The solutions to missing tag identification can be classified into two categories: ID collection protocol [9], [10], [14], [18]- [20] and missing tag identification protocol [3], [11]- [13], [15], [16], [21].…”
Section: Related Workmentioning
confidence: 99%
“…R ADIO frequency identification (RFID), as a compelling technology in the Internet of Things, is widely used in various applications, such as supply chain management [1], [2], inventory control [3], [4], and localization [5], [6]. In these applications, RFID can realize automated inventory management with its significant advantages of fast identification, high reliability, and long distance.…”
Section: Introductionmentioning
confidence: 99%
“…As a proactive defense mechanism, a honeypot is becoming an indispensable tool for providing network security in wide applications such as Internet of Things (IoT) [1]- [4], wireless sensor networks (WSNs) [5], [6] and vehicular networks [7], etc. With proactivity and inveiglement, a honeypot can attract an attacker to interact with the fake system resources, which prevents valuable resources from being attacked.…”
Section: Introductionmentioning
confidence: 99%
“…With the wide applications of social networks [18], [25]- [27] and Internet of things (IoTs) [4], [5], [10], [23], [24], [29], the recommendation system is popular in people's daily lives recently, such as online shopping, article reading, and films, etc. For instance, the recommendation system can greatly help the customers by suggesting them the products or services with potential interest, based on their preferences, needs, and purchase histories.…”
Section: Introductionmentioning
confidence: 99%