{"id":"https://openalex.org/W2106320249","doi":"https://doi.org/10.1145/1514274.1514281","title":"RFID-based supply chain partner authentication and key agreement","display_name":"RFID-based supply chain partner authentication and key agreement","publication_year":2009,"publication_date":"2009-03-16","ids":{"openalex":"https://openalex.org/W2106320249","doi":"https://doi.org/10.1145/1514274.1514281","mag":"2106320249"},"language":"en","primary_location":{"id":"doi:10.1145/1514274.1514281","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1514274.1514281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM conference on Wireless network security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["SAP Research, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009910864","display_name":"Alessandro Sorniotti","orcid":null},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Alessandro Sorniotti","raw_affiliation_strings":["SAP Research and Institut Eurecom, Sophia Antipolis, France","SAP Research and Institut Eurecom, Sophia Antipolis, France#TAB#"],"affiliations":[{"raw_affiliation_string":"SAP Research and Institut Eurecom, Sophia Antipolis, France","institution_ids":["https://openalex.org/I1902872"]},{"raw_affiliation_string":"SAP Research and Institut Eurecom, Sophia Antipolis, France#TAB#","institution_ids":["https://openalex.org/I1902872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102985450"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":8.432,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.97585101,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.664211094379425},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.6621931791305542},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6034747958183289},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47526639699935913},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46898704767227173},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3256949782371521},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.05832943320274353}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.664211094379425},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.6621931791305542},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6034747958183289},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47526639699935913},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46898704767227173},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3256949782371521},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.05832943320274353}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1514274.1514281","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1514274.1514281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM conference on Wireless network security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W5798129","https://openalex.org/W47635216","https://openalex.org/W155903907","https://openalex.org/W1541829396","https://openalex.org/W1569083856","https://openalex.org/W1590823599","https://openalex.org/W1592092778","https://openalex.org/W1890078278","https://openalex.org/W1963860253","https://openalex.org/W1993546472","https://openalex.org/W1998368731","https://openalex.org/W2009726262","https://openalex.org/W2014239329","https://openalex.org/W2052267638","https://openalex.org/W2078194183","https://openalex.org/W2086042811","https://openalex.org/W2096356985","https://openalex.org/W2114428623","https://openalex.org/W2117685508","https://openalex.org/W2136757778","https://openalex.org/W2140853977","https://openalex.org/W2142890881","https://openalex.org/W2156186849","https://openalex.org/W2159845428","https://openalex.org/W2164101323","https://openalex.org/W2165059003","https://openalex.org/W2402820154","https://openalex.org/W2949387850","https://openalex.org/W3004458683","https://openalex.org/W4299301436","https://openalex.org/W6601951077","https://openalex.org/W6670042020"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2767550285","https://openalex.org/W2620085874","https://openalex.org/W2064496565","https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W1575661125","https://openalex.org/W4309070544","https://openalex.org/W2730112582","https://openalex.org/W2912135041"],"abstract_inverted_index":{"The":[0,54],"growing":[1],"use":[2,114],"of":[3,22,28,33,36,92,119,145,165,174],"RFID":[4],"in":[5,129],"supply":[6,38,67,94,167],"chains":[7],"brings":[8],"along":[9],"an":[10],"indisputable":[11],"added":[12],"value":[13],"from":[14],"the":[15,31,37,43,66,90,102,143,156,163,166,180],"business":[16,71,120],"perspective,":[17],"but":[18,47],"raises":[19],"a":[20,75,93,108,130,146,151],"number":[21],"new":[23],"interesting":[24],"security":[25,172],"challenges.":[26],"One":[27],"them":[29],"is":[30,56],"authentication":[32,158],"two":[34,98],"participants":[35,64],"chain":[39,68,95],"that":[40,48,63,79],"have":[41,49,100],"possessed":[42,101],"same":[44,103],"tagged":[45],"item,":[46],"otherwise":[50],"never":[51],"communicated":[52],"before.":[53],"situation":[55],"even":[57],"more":[58],"complex":[59],"if":[60,97],"we":[61],"imagine":[62],"to":[65,115,154],"may":[69],"be":[70,127,137],"competitors.":[72],"We":[73,169],"present":[74],"novel":[76],"cryptographic":[77],"scheme":[78],"solves":[80],"this":[81],"problem.":[82],"In":[83],"our":[84,175],"solution,":[85],"users":[86],"exchange":[87,118],"tags":[88],"over":[89],"cycle":[91],"and,":[96],"entities":[99],"tag,":[104],"they":[105,112],"agree":[106],"on":[107,179],"secret":[109,147,160],"common":[110],"key":[111],"can":[113,126],"protect":[116],"their":[117],"sensitive":[121],"information.":[122],"No":[123],"rogue":[124],"user":[125],"successful":[128],"malicious":[131],"authentication,":[132],"because":[133],"it":[134,140],"would":[135,141],"either":[136],"traceable":[138],"or":[139],"imply":[142],"loss":[144],"key,":[148],"which":[149],"provides":[150],"strong":[152],"incentive":[153],"keep":[155],"tag":[157],"information":[159],"and":[161],"protects":[162],"integrity":[164],"chain.":[168],"provide":[170],"game-based":[171],"proofs":[173],"claims,":[176],"without":[177],"relying":[178],"random":[181],"oracle":[182],"model.":[183]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
