Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/105658
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Computing | - |
| dc.creator | Qi, S | en_US |
| dc.creator | Zheng, Y | en_US |
| dc.creator | Chen, X | en_US |
| dc.creator | Ma, J | en_US |
| dc.creator | Qi, Y | en_US |
| dc.date.accessioned | 2024-04-15T07:35:44Z | - |
| dc.date.available | 2024-04-15T07:35:44Z | - |
| dc.identifier.isbn | 978-1-5386-1792-2 (Electronic) | en_US |
| dc.identifier.isbn | 978-1-5386-1793-9 (Print on Demand(PoD)) | en_US |
| dc.identifier.uri | http://hdl.handle.net/10397/105658 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
| dc.rights | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
| dc.rights | The following publication S. Qi, Y. Zheng, X. Chen, J. Ma and Y. Qi, "Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain," 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 2017, pp. 414-424 is available at https://doi.org/10.1109/ICDCS.2017.265. | en_US |
| dc.title | Double-edged sword : incentivized verifiable product path query for RFID-enabled supply chain | en_US |
| dc.type | Conference Paper | en_US |
| dc.identifier.spage | 414 | en_US |
| dc.identifier.epage | 424 | en_US |
| dc.identifier.doi | 10.1109/ICDCS.2017.265 | en_US |
| dcterms.abstract | Querying the path information of individual products in a supply chain is key to many applications. RFID (Radio-Frequency IDentification) is a main technology to enable product path information query today. With RFID technology, supply chain participants can efficiently track products in transit and record their production information in databases. In this paper, we investigate the following question: how can we conduct privacy-preserving product path information query with verifiability on an RFID-enabled distributedsupplychain?WeaddressthisquestionwithDouble Edged(DE)-Sword,anincentivizedverifiablequerysystem. DESword introduces a novel double-edged reputation incentive mechanism to encourage supply chain participants to behave; and couples it with cryptographic primitives and careful protocol design. We evaluate DE-Sword through security analysis and performance experiments. The security analysis shows that DE-Sword guarantees both verifiability and privacy. The experiment results show that DE-Sword achieves low overhead in RFID-enabled supply chain applications. | - |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 5-8 June 2017, Atlanta, Georgia, p. 414-424 | en_US |
| dcterms.issued | 2017 | - |
| dc.identifier.scopus | 2-s2.0-85027268675 | - |
| dc.relation.conference | IEEE International Conference on Distributed Computing Systems [ICDCS] | - |
| dc.description.validate | 202402 bcch | - |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.FolderNumber | COMP-1190 | - |
| dc.description.fundingSource | RGC | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.identifier.OPUS | 9600871 | - |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Conference Paper | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Zheng_Double-Edged_Sword_Incentivized.pdf | Pre-Published version | 922.24 kB | Adobe PDF | View/Open |
Page views
149
Last Week
3
3
Last month
Citations as of Nov 30, 2025
Downloads
97
Citations as of Nov 30, 2025
SCOPUSTM
Citations
10
Citations as of Dec 19, 2025
WEB OF SCIENCETM
Citations
9
Citations as of Dec 18, 2025
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



