Achieving high security and efficiency in RFID-tagged supply chains (Q5962407)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Achieving high security and efficiency in RFID-tagged supply chains |
scientific article; zbMATH DE number 5789969
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Achieving high security and efficiency in RFID-tagged supply chains |
scientific article; zbMATH DE number 5789969 |
Statements
Achieving high security and efficiency in RFID-tagged supply chains (English)
0 references
22 September 2010
0 references
Summary: While RFID technology has greatly facilitated visible supply chain management, designing a secure and efficient RFID-tagged supply chain system is still a challenge. To achieve high security and efficiency at the same time, we categorise RFID-tagged supply chain environments in two security levels and design an RFID-tagged supply chain system accordingly. In the relatively secure environment, our system is set to the weak security mode, and the tagged products can be processed in a highly efficient manner. While in the less secure environment, our system is tuned into the strong security mode so as to maintain a high level of security with its efficiency lower than that in the weak security mode. A set of RFID protocols are designed to enable the duel security modes.
0 references
RFID security
0 references
supply chain security
0 references
visibility
0 references
supply chain efficiency
0 references
RFID protocols
0 references
supply chain management
0 references
SCM
0 references
radio freqeuency identification
0 references
RFID tags
0 references
information security
0 references
0.7181838750839233
0 references
0.714926540851593
0 references
0.6998346447944641
0 references
0.6886005401611328
0 references