Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Supply Chain
biblio
LADP: A lightweight authentication and delegation protocol for RFID tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
protocol
telecommunication security
Supply Chain
RFID tags
RFID security
RFID privacy
RFID
Resists
radiofrequency identification
PUF-enabled tags
pubcrawl170112
Protocols
authentication
privacy
physically unclonable function
ownership transfer process
owner privacy protection
lightweight authentication-and-delegation protocol
LADP
delegation
data privacy
Cryptographic Protocols
computation cost reduction
communication cost reduction
biblio
Securing a Deployment Pipeline
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
Analytical models
continuous deployment
deployment pipeline security
DevOps
engineering process
Permission
Pipelines
pubcrawl170112
security of data
Software
Supply Chain
supply chains
trusted components
Trusted Computing
biblio
Impact analysis of transport capacity and food safety in Bogota
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
fruits
vehicle dynamics
vegetables
transport infrastructure
transport capacity
System Dynamics
supply chains
Supply Chain
pubcrawl170112
Production
meat
groceries
Bogota
food supply chain
food security impact
food safety policies
food safety
food
dairy
customer services
customer service improvement
critical infrastructures
Cities and towns
biblio
Cloud-based technologies for addressing long vehicle turnaround times at recycling mills
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
ART
Cloud Computing
CRM
encryption
enterprise systems
Image coding
Image edge detection
knowledge management
Media
pubcrawl170112
Supply Chain
Transportation company
biblio
A fair exchange and track system for RFID-tagged logistic chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
radiofrequency identification
verifiably encrypted signature
telecommunication security
supply chains
Supply Chain
RFID tags
RFID tagged supply chains
RFID tagged logistic chains
RFID
Receivers
cryptographic attestation
radio receivers
radio frequency identification
pubcrawl170112
Protocols
logistics operations
Iron
fair exchange techniques
fair exchange
Cryptography
biblio
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
quadratic residue
supply chains
Supply Chain
Servers
Security analysis
security
secure RFID tag ownership transfer protocol
RFID-OT protocol improvement
RFID
radiofrequency identification
radio frequency identification
Quadratic Residues
cryptanalysis
pubcrawl170112
Protocols
protocol
probability
privacy
Ownership Transfer
Information systems
desynchronization attack
Cryptography
Cryptographic Protocols
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
biblio
Object event visibility for anti-counterfeiting in RFID-enabled product supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
object-centric coding mechanism
track-and-trace
taxonomy
system architecture framework
supply chains
supply chain management
Supply Chain
security measures
security
RFID-enabled product supply chain visibility
radiofrequency identification
pubcrawl170112
production engineering computing
anti-counterfeiting
object-based event “pedigree”
object event visibility
event pedigree
event exception detection
EPC-based events
Engines
e-pedigree
dynamically updated e-pedigree
Databases
counterfeiting activities
counterfeiting
anticounterfeiting
biblio
Risk assessment of agricultural supply chain based on AHP- FCS in Eastern Area of Hunan Province
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
natural disasters
the AHP- FCS method
supply chains
Supply Chain
security
risk management
risk assessment
risk analysis
Reliability
pubcrawl170112
agricultural product
Hunan province
fuzzy set theory
fuzzy comprehensive analysis
Face
economic development stability
analytic hierarchy process
AHP- FCS
agricultural supply chain
agricultural products
biblio
A variant of schnorr signature scheme for path-checking in RFID-based supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
pubcrawl170112
telecommunication security
supply chains
supply chain management
Supply Chain
Security analysis
Schnorr signature
RFID-based supply chains
RFID technology
RFID
radiofrequency identification
authentication
Protocols
privacy analysis
privacy
path-checking protocols
path-checking
modified schnorr signature scheme
Generators
data privacy
check reader
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »