Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFID tag
biblio
Design and Implementation of RFID Based E-Document Verification System
Submitted by grigby1 on Fri, 02/04/2022 - 2:50pm
Liquid crystal displays
RFIDs
RFID(Radio frequency identification)
RFID tag
magnetic fields
Liquid Crystal Display (LCD)
Fingers
e-document verification
human behaviors
RFID
security
radio frequency identification
Manuals
privacy
Hardware
Resiliency
resilience
Human behavior
pubcrawl
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
LED lightweight cryptographic algorithm
search problems
RFIDs
RFID tags
RFID tag chip
RFID tag
Resiliency
radiofrequency identification
radio frequency identification tags
pubcrawl
Piccolo cryptographic algorithm
light emitting diodes
LED lightweight cryptography
Algorithm
InvS-box
Internet of Things
Human behavior
FPGA
field programmable gate arrays
DPA protection technology threshold
DPA attack
Differential Power Analysis
Cryptography
Ciphers
Boolean functions
Boolean expression reconstruction
biblio
Investigating Attacks to Improve Security and Privacy in RFID Systems Using the Security Bit Method
Submitted by grigby1 on Wed, 10/02/2019 - 3:02pm
radiofrequency identification
wireless device
telecommunication security
security bit method
security
RFIDs
RFID technology
RFID tags
RFID tag
RFID systems
RFID security development
RFID reader
RFID
Resiliency
resilience
counterfeit
Radio frequency identification (RFID)
radio frequency identification
Radar
pubcrawl
privacy problems
privacy
Object recognition
Human Factors
Human behavior
Electronic Product Code (EPC)
Digital Information
Databases
data privacy
biblio
New clone-detection approach for RFID-based supply chains
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
radiofrequency identification
telecommunication security
tag tracing
supply chains
supply chain partners
Servers
security issues
RFIDs
RFID-based supply chains
RFID technology
RFID tags
RFID tag
RFID monitoring schemes
RFID
Resiliency
authentication
radio-frequency identification
pubcrawl
NVM
Nonvolatile memory
low-cost wireless method
Human Factors
Human behavior
encoded local database
Databases
counterfeit product injection detection
Cloning
clone-detection approach
back-end database
biblio
An RFID-based technology for electronic component and system Counterfeit detection and Traceability
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
production engineering computing
system counterfeit detection
supply chains
Supply Chain
Spartan 3E FPGA
Sensor Systems
RFID-based technology
RFID-based system
RFID tag
RF
radiofrequency identification
radio frequency communication
Radio frequency
Radiation detectors
pubcrawl170112
counterfeit goods
printed slot antenna
printed circuits
printed circuit board
PCB prototype
on-chip sensors
multiple counterfeit IC types
microstrip antennas
in-system structures
field programmable gate arrays
Electronic components
electronic component
device provenance
CST
counterfeit integrated circuits
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation
biblio
Security applications challenges of RFID technology and possible countermeasures
Submitted by BrandonB on Thu, 04/30/2015 - 2:17pm
Product Code
wireless technology
warfare machinery
telecommunication security
security
RFID tag
RFID reader
RFID
radiofrequency identification
product code technology
antennas
Management
ISO standards
Intelligent systems
integrated circuits
information technology
information and communication technology
ICT
frequency allocation
Communication channels