Privacy-Enhanced Searches Using Encrypted Bloom Filters, Cryptology ePrint Archive Report, p.22, 2004. ,
Tracker: Security and Privacy for RFIDbased Supply Chains, Proceedinsg of the 18th Network and Distributed System Security Symposium, pp.455-472, 2011. ,
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
DOI : 10.1145/362686.362692
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2080
Non-interactive zero-knowledge and its applications, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.103-112, 1988. ,
DOI : 10.1145/62212.62222
Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, pp.485-509, 2003. ,
DOI : 10.1080/15427951.2004.10129096
Private Intersection of Certified Sets, Proceedings of the International Conference on Financial Cryptography and Data Security, pp.108-127, 2009. ,
DOI : 10.1007/978-3-540-45146-4_19
Efficient Robust Private Set Intersection, Proceedings of the 7th International Conference on Applied Cryptography and Network Security, pp.125-142, 2009. ,
DOI : 10.1109/SFCS.1982.38
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model, Proceedings of ASIACRYPT, pp.213-231, 2010. ,
DOI : 10.1007/978-3-642-17373-8_13
The impact of perceived privacy risks on organizations??? willingness to share item-level event data across??the??supply chain, Electronic Commerce Research, vol.48, issue.9, pp.3-4, 2010. ,
DOI : 10.1093/acprof:oso/9780199266241.001.0001
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Proceedings of CRYPTO, pp.186-194, 1986. ,
DOI : 10.1007/3-540-47721-7_12
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2003. ,
DOI : 10.1002/9780470665121
Efficient Private Matching and Set Intersection, Proceedings of EUROCRYPT, pp.1-19, 2004. ,
DOI : 10.1007/978-3-540-24676-3_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.931
Fujitsu Develops World's First 64KByte High-Capacity FRAM RFID Tag for Aviation Applications. Press Release Available at http://www.fujitsu.com/global, 2008. ,
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592
Secure Indexes, Cryptology ePrint Archive Report, vol.216, 2003. ,
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems, Journal of the ACM, vol.38, issue.3, pp.690-728, 1991. ,
DOI : 10.1145/116825.116852
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle, Proceedings of EUROCRYPT, pp.379-396, 2008. ,
DOI : 10.1007/978-3-540-78967-3_22
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries, Proceedings of the 5th Conference on Theory of Cryptography, pp.155-175, 2008. ,
DOI : 10.1007/978-3-540-78524-8_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.6019
Introduction to Modern Cryptography: Principles and Protocols, 2007. ,
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting, Proceedings of the 6th Workshop on RFID Security, pp.124-137, 2010. ,
DOI : 10.1007/978-3-642-16822-2_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.621.1938
Privacy-Preserving Set Operations, Proceedings of CRYPTO, pp.241-257, 2005. ,
DOI : 10.1007/11535218_15
How to detect cloned tags in a reliable way from incomplete RFID traces, 2009 IEEE International Conference on RFID, pp.257-264, 2009. ,
DOI : 10.1109/RFID.2009.4911190
Protecting RFID communications in supply chains, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.234-241, 2007. ,
DOI : 10.1145/1229285.1229318
Cryptographically Secure Bloom-Filters, Transactions on Data Privacy, vol.2, pp.131-139, 2009. ,
Tracking based product authentication: Catching intruders in the supply chain, Proceedings of the 17th European Conference on Information Systems, 2008. ,
Pathchecker: an RFID Application for Tracing Products in Suply-Chains, Proceedings of the 5th Workshop on RFID Security, 2009. ,
RFID in the supply chain, Communications of the ACM, vol.51, issue.10, pp.127-131, 2008. ,
DOI : 10.1145/1400181.1400209
Non-Interactive CryptoComputing For NC1, Proceedings of the 40th Symposium on Foundations of Computer Science, pp.554-567, 1999. ,
DOI : 10.1109/sffcs.1999.814630
Radio frequency identification and the electronic product code, IEEE Micro, vol.21, issue.6, pp.50-54, 2001. ,
DOI : 10.1109/40.977758
Extending the EPC Network ? The Potential of RFID in Anti-Counterfeiting, Proceedings of the 20th ACM Symposium on Applied Computing, pp.1607-1612, 2005. ,
Using Creativity to Fight a $60 Billion Consumer Problem ? Counterfeit Goods, Loyola Chicago Consumer Law Review, vol.10, issue.1, p.88, 1998. ,
Privacy-preserving clone detection for RFID-enabled supply chains, 2010 IEEE International Conference on RFID (IEEE RFID 2010), pp.37-44, 2010. ,
DOI : 10.1109/RFID.2010.5467257
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.4637