Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105658
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorQi, Sen_US
dc.creatorZheng, Yen_US
dc.creatorChen, Xen_US
dc.creatorMa, Jen_US
dc.creatorQi, Yen_US
dc.date.accessioned2024-04-15T07:35:44Z-
dc.date.available2024-04-15T07:35:44Z-
dc.identifier.isbn978-1-5386-1792-2 (Electronic)en_US
dc.identifier.isbn978-1-5386-1793-9 (Print on Demand(PoD))en_US
dc.identifier.urihttp://hdl.handle.net/10397/105658-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsThe following publication S. Qi, Y. Zheng, X. Chen, J. Ma and Y. Qi, "Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain," 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 2017, pp. 414-424 is available at https://doi.org/10.1109/ICDCS.2017.265.en_US
dc.titleDouble-edged sword : incentivized verifiable product path query for RFID-enabled supply chainen_US
dc.typeConference Paperen_US
dc.identifier.spage414en_US
dc.identifier.epage424en_US
dc.identifier.doi10.1109/ICDCS.2017.265en_US
dcterms.abstractQuerying the path information of individual products in a supply chain is key to many applications. RFID (Radio-Frequency IDentification) is a main technology to enable product path information query today. With RFID technology, supply chain participants can efficiently track products in transit and record their production information in databases. In this paper, we investigate the following question: how can we conduct privacy-preserving product path information query with verifiability on an RFID-enabled distributedsupplychain?WeaddressthisquestionwithDouble Edged(DE)-Sword,anincentivizedverifiablequerysystem. DESword introduces a novel double-edged reputation incentive mechanism to encourage supply chain participants to behave; and couples it with cryptographic primitives and careful protocol design. We evaluate DE-Sword through security analysis and performance experiments. The security analysis shows that DE-Sword guarantees both verifiability and privacy. The experiment results show that DE-Sword achieves low overhead in RFID-enabled supply chain applications.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitation2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 5-8 June 2017, Atlanta, Georgia, p. 414-424en_US
dcterms.issued2017-
dc.identifier.scopus2-s2.0-85027268675-
dc.relation.conferenceIEEE International Conference on Distributed Computing Systems [ICDCS]-
dc.description.validate202402 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberCOMP-1190-
dc.description.fundingSourceRGCen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS9600871-
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
Zheng_Double-Edged_Sword_Incentivized.pdfPre-Published version922.24 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

149
Last Week
3
Last month
Citations as of Nov 30, 2025

Downloads

97
Citations as of Nov 30, 2025

SCOPUSTM   
Citations

10
Citations as of Dec 19, 2025

WEB OF SCIENCETM
Citations

9
Citations as of Dec 18, 2025

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.