|
[1]Disney, S.M., Towill, D.R., “The Effect of Vendor Managed Inventory (VMI) Dynamics on the Bullwhip Effect in Supply Chains,” International Journal of Production Economics, Vol.85, Issue 2, pp. 199–215, August 2003 [2]Doss, R., Zhou, W., Yu, S., “Secure RFID Tag Ownership Transfer Based on Quadratic Residues,” Proceedings of IEEE Transactions on Information Forensics and Security, Vol. 8, No. 2, pp. 390-401, February 2013. [3]Evdokimov, S., Günther, O., “Practical Access Control Management for Outsourced EPC-Related Data in RFID-Enabled Supply Chain,” Proceedings of 2007 IEEE International Conference e-Business Engineering, pp. 331 - 336, October 2007. [4]Hu, X.Z., “Coordinated Pricing and Replenishment Interval in Distribution System with VMI,” NCU Department of Industrial Management, June 2008. [5]He, W., Li, Y.J., Chiew, K., Li, T., Lee, E.W., “A Solution with Security Concern for RFID-Based Track & Trace Services in EPCglobal-Enabled Supply Chains,” Designing and Deploying RFID Applications, ISBN 978-953-307-265-4, June 2011. [6]Harrison, M., “EPC Information Service (EPCIS),” Proceedings of 2004 Auto-ID Labs Workshop, pp. 29-30, August 2004. [7]Kapoor, G., Piramuthu, S., “Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols,” Proceedings of IEEE Communications Letters, Vol. 14, No. 3, pp. 354-357, March 2010. [8]Kardaş, S., Akgün, M., Kiraz, M.S., Demirci, H., “Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems,” Proceedings of 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, pp. 20-25, March 2011. [9]Kapoor, G., Zhou, W., Piramuthu, S., “Multi-tag and Multi-owner RFID Ownership Transfer in Supply Chains”, Proceedings of 2011 Decision Support Systems, Vol. 52, pp. 258–270, September 2011. [10]Lin, W.Z., “Research of Vendor Managed Inventory Optimal Strategy Implementation,” NSYSU Department of Business Management, June 2005. [11]Peris-Lopez, P., Hernandez-Castro, C. J., Tapiador, M.E. J., Li, T., Li, Y.J., “Vulnerability analysis of RFID protocols for tag ownership transfer,” Proceedings of 2010 Computer Networks Conference, Vol.54, pp. 1502–1508, November 2010. [12]Ray, R. B., Chowdhury, M., Abawajy, J., “Secure Mobile RFID Ownership Transfer Protocol to Cover all Transfer Scenarios,” Proceedings of 2012 7th Computing and Convergence Technology International Conference, pp. 1185 - 1192, December 2012. [13]Song, B., Mitchell, J. C., “Scalable RFID Security Protocols Supporting Tag Ownership Transfer,” Proceedings of 2011 Computer Communications Conference, Vol. 34, pp. 556–566, March 2011. [14]Safkhani, M., Bagheri, N., Naderi, M., Luo, Y., Qi C., “Tag Impersonation Attack on Two RFID Mutual Authentication Protocols,” Proceedings of 2011 Availability, Reliability and Security 6th International Conference, pp. 581 - 584, August 2011. [15]Yang, M.H., “Across-authority Lightweight Ownership Transfer Protocol,” Proceedings of 2011 Electronic Commerce Research and Applications Comference, Vol.10, pp. 375–383, March 2011 [16]Yang, M.H., “Secure Multiple Group Ownership Transfer Protocol for Mobile RFID,” Proceedings of 2012 Electronic Commerce Research and Applications Conference, Vol. 11, pp. 361–373, January 2012 [17]Zanoni, S., Jaber, Y. M., Zavanella, E. L., “Vendor Managed Inventory (VMI) with Consignment Considering Learning and Forgetting Effects,” International Journal of Production Economics, Vol.140, Issue 1, pp. 721–730, December 2012 [18]Zhou, W., Yoon, E.Y., Piramuthu, S., “Simultaneous multi-level RFID tag ownership & transfer in health care environments,” Decision Support Systems, Vol. 54, Issue 1, pp. 98–108, December 2012. [19]Zhou, W., Piramuthu, S., “Preventing ticket-switching of RFID-tagged items in apparel retail stores,” Proceedings of 2013 Decision Support Systems Conference, Vol. 55, pp. 802–810, March 2013 [20]Zhen, X.M., “Grouping Proof Protocols based on Low-cost RFID Tags,” NTUST department of Information Management, July 2013.
|