Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFID
biblio
The Research on IOT Security Architecture and Its Key Technologies
Submitted by aekwall on Mon, 05/04/2020 - 11:06am
information processing
scientific information technology
IoT security architecture
information security system
information industry
economic development
Network Security Architecture
WSN
RFID
radiofrequency identification
security of data
security threats
security architecture
pubcrawl
Resiliency
information security
computer architecture
Internet of Things
technological development
biblio
Learning Automata Based Secure Multi Agent RFID Authentication System
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
RFID tags
RFIDs
utility function
technological developments
Scyther
RFID technologies
RFID scenario
multiagent intelligent system
Multi Agent
long term benefit
learning automata
expertly transfer utility
automata based secure multiagent RFID authentication system
RFID system
security
radiofrequency identification
sensitive data
RFID
authentication
privacy
multi-agent systems
radio frequency identification
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
Novel Hybrid Physical Layer Security Technique in RFID Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
directive antennas
RFIDs
RFID tag information confidentiality
receiving antennas
radio frequency identification backscatter communications
PHY layer security technique
PHY layer security
one dimensional antenna array
noise injection security technique
noise injection
hybrid physical layer security
eavesdroppers attacks
telecommunication security
beam steering
backscatter channel
backscatter
RFID systems
RFID
radiofrequency identification
antenna arrays
pubcrawl
Human behavior
Resiliency
security
biblio
RFID-assisted Continuous User Authentication for IoT-based Smart Farming
Submitted by aekwall on Mon, 03/23/2020 - 1:32pm
machine data
agricultural contractors
agricultural machines
collaborative agricultural processes
farm management information systems
farm-internal interconnection
FMIS
in-field data exchange
interconnected machinery
IoT-based smart Farming
electronic data interchange
Machinery
Management information systems
NFC
Radio Frequency Identification-based continuous user authentication
RFID-assisted continuous user authentication
Smart Farming
sustainable resource management
RFIDs
authentication
authorization
Internet of Things
security
Resiliency
Human behavior
pubcrawl
Business
sustainable development
Servers
public domain software
message authentication
security architecture
radiofrequency identification
RFID
Agriculture
groupware
Decision support systems
biblio
Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application
Submitted by aekwall on Mon, 02/10/2020 - 11:44am
piccolo encryption algorithm
4 input LUTs
64 bits block size
area optimization
ASIC
constrained RFID application
different design strategies
efficient hardware architecture
Fiestel structure
hardware design
hardware metrics
low resource applications
optimized area
Piccolo Algorithm
128 bits
piccolo lightweight algorithm
radiofrequency identification
relevant lightweight block ciphers
severe security concerns
supports high speed
Throughput.
tremendous pace
ultra-lightweight applications
variable key size
word length 64.0 bit
word length 80.0 bit
Xillinx
Microelectronics Security
security applications
field programmable gate arrays
FPGA
Cryptography
encryption
Internet of Things
telecommunication security
Hardware
Table lookup
IoT applications
smart devices
Resiliency
pubcrawl
composability
IoT
RFID
Throughput
Ciphers
security issues
Predictive Metrics
private information
word length 128.0 bit
Hardware Implementation
hardware resources
lightweight cryptographic algorithms
S-box
lightweight cryptography
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
modeling technique
traffic characterization
telecommunication traffic
telecommunication security
RFIDs
RFID traffic patterns
RFID traffic models
RFID traces
RFID security
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
piecewise graphs
NFC
Adaptation models
modeling algorithms
Knuth's Rule
ISO standards
IoT
IEC standards
Human Factors
Human behavior
graph theory
Computational modeling
binned RFID command counts
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
potential attacks
Supply Chain
SQL injection attack
SQL
Servers
security
RFIDs
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification technology
pubcrawl
Protocols
privacy
access control system
identity related information
Human Factors
Human behavior
high security demand
distributed system
distributed RFID systems
distributed environment
Cryptographic Protocols
credit card
Computers
blockchain-based mutual authentication security protocol
blockchain
authorisation
authentication
biblio
A Secure and Efficient Parallel-Dependency RFID Grouping-Proof Protocol
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
pubcrawl
telecommunication security
Sundaresan grouping-proof protocols
serial-dependent grouping-proof protocol
security
Scalability
robust privacy mechanisms
RFIDs
RFID tagged objects group
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification
Cryptographic Protocols
Protocols
privacy
parallel-dependency RFID grouping-proof protocol
parallel-dependency grouping-proof protocol
parallel protocol
missing tags
improved offline protocol
Human Factors
Human behavior
grouping-proofs
Elliptic curve cryptography
data privacy
biblio
Lightweight Security Protocol for Chipless RFID in Internet of Things (IoT) Applications
Submitted by grigby1 on Wed, 10/02/2019 - 3:02pm
privacy
tag/reader anonymity
security
Secuity
RFIDs
RFID tags
RFID based communication
RFID
Resiliency
resilience
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
BASYS 2 FPGA board based platform
lightweight security protocol
lightweight collision free algorithm
IoT
Internet of Things
Human Factors
Human behavior
field programmable gate arrays
Databases
Cryptographic Protocols
chipless RFID tag based system
chipless RFID system
Chipless RFID
broader IoT framework
biblio
An Emerging Application Centric RFID Framework Based on New Web Technology
Submitted by grigby1 on Wed, 10/02/2019 - 3:02pm
resilience
Web technology
Uniform resource locators
telecommunication security
Servers
RFIDs
RFID tags
RFID framework
RFID
REST protocols
Resiliency
antennas
radiofrequency identification
pubcrawl
Protocols
IoT
internet
Human Factors
Human behavior
framework
Databases
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »