Traceability in supply chains: A Cyber security analysis.
Naeem Firdous SyedSyed W. ShahRolando Trujillo-RasuaRobin DossPublished in: Comput. Secur. (2022)
Keyphrases
- security analysis
- supply chain
- supply chain management
- smart card
- security requirements
- software architecture
- public key
- inventory management
- life cycle
- supplier selection
- bullwhip effect
- lead time
- revenue sharing
- authentication protocol
- encryption scheme
- user authentication
- customer demand
- rfid technology
- decision making
- service level
- multi agent