Proceedings of the Third ACM Conference on Wireless Network Security 2010
DOI: 10.1145/1741866.1741884
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving computation of benchmarks on item-level data using RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…This is significantly more information than necessary to authenticate or make the access decision. Although our protocols already improve over proposals for standards [1] by revealing this information only to partners on the same supply chain and not any player in the system, approaches using modern cryptography [29,46] show that significantly better confidentiality protection is feasible. A more privacy-preserving protocol that only reveals the necessary information, such as the rank, seems like a welcomed improvement.…”
Section: Improvements To the Authentication Protocolmentioning
confidence: 95%
See 1 more Smart Citation
“…This is significantly more information than necessary to authenticate or make the access decision. Although our protocols already improve over proposals for standards [1] by revealing this information only to partners on the same supply chain and not any player in the system, approaches using modern cryptography [29,46] show that significantly better confidentiality protection is feasible. A more privacy-preserving protocol that only reveals the necessary information, such as the rank, seems like a welcomed improvement.…”
Section: Improvements To the Authentication Protocolmentioning
confidence: 95%
“…On the one hand, combining this data from many companies (just predecessor and successor is almost always insufficient) along the supply chain enables or improves many economically attractive collaborative applications, such as batch recalls [46], counterfeit detection [43], benchmarking and analytics [27,28,29] or estimated arrival forecasts [12]. We therefore expect an increasing interest by companies to adopt object-level tracking technology.…”
Section: Introductionmentioning
confidence: 99%
“…Kerschbaum et al [19] propose to privately compute performance properties of an RFID supply chain using data stored on tags. However, this work focuses on computing these metrics without leaking sensitive information of the supply-chain's parties.…”
Section: Related Workmentioning
confidence: 99%
“…However, this work focuses on computing these metrics without leaking sensitive information of the supply-chain's parties. Kerschbaum et al [19] use additive homomorphic encryption that does not support collecting statistics on multiple properties and consequently cannot be as efficient as PPS.…”
Section: Related Workmentioning
confidence: 99%
“…Data commonly collected in supply chains include time, location, and type of handling (e.g., packing, unpacking, receiving, or shipping). On one hand, combining these data from all the companies along a supply chain (not just predecessor and successor of each phase) enables or improves many economically attractive collaborative applications, including batch recalls [29], counterfeit detection [28], benchmarking and analytics [18]- [20], or estimated arrival forecasts [6]. On the other hand, information collected along the supply chain may be considered sensitive as it allows espionage on the business operations of the involved companies [12], [23].…”
Section: Introductionmentioning
confidence: 99%