Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFID technology
biblio
Store Management Security System
Submitted by grigby1 on Fri, 04/28/2023 - 2:51pm
Cryptography
security
pubcrawl
composability
Business
Reliability
Compositionality
radiofrequency identification
computational intelligence
Communications technology
customer satisfaction
Arduino Uno
RFID technology
Simulator.
Store Management
Store Security
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic Algorithm
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
anticounterfeiting authentication identification code
RFIDs
UHF RFID tag
UHF RFID information security transmission technology
transmission encryption
tag information
SM7 domestic cryptographic algorithm
intelligent manufacturing
domestic cryptographic algorithm
data security protection
Cryptography
RFID technology
radiofrequency identification
information security
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
biblio
Investigating Attacks to Improve Security and Privacy in RFID Systems Using the Security Bit Method
Submitted by grigby1 on Wed, 10/02/2019 - 2:02pm
radiofrequency identification
wireless device
telecommunication security
security bit method
security
RFIDs
RFID technology
RFID tags
RFID tag
RFID systems
RFID security development
RFID reader
RFID
Resiliency
resilience
counterfeit
Radio frequency identification (RFID)
radio frequency identification
Radar
pubcrawl
privacy problems
privacy
Object recognition
Human Factors
Human behavior
Electronic Product Code (EPC)
Digital Information
Databases
data privacy
biblio
Reliability, availability and security of computer systems supported by RFID technology
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
quantitative indicators
software reliability
Software
security of data
security
RFID technology
Resiliency
resilience
Reliability
radiofrequency identification
composability
pubcrawl
Microelectronic Security
Metrics
Hardware
Computers
computer systems security
computer systems reliability
computer systems availability
computer system quality
biblio
New clone-detection approach for RFID-based supply chains
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
radiofrequency identification
telecommunication security
tag tracing
supply chains
supply chain partners
Servers
security issues
RFIDs
RFID-based supply chains
RFID technology
RFID tags
RFID tag
RFID monitoring schemes
RFID
Resiliency
authentication
radio-frequency identification
pubcrawl
NVM
Nonvolatile memory
low-cost wireless method
Human Factors
Human behavior
encoded local database
Databases
counterfeit product injection detection
Cloning
clone-detection approach
back-end database
biblio
The Design of Brand Cosmetics Anti-counterfeiting System Based on RFID Technology
Submitted by grigby1 on Wed, 03/08/2017 - 1:29pm
RFID technology
nonsecurity phenomena
product logistics information tracing
product logistics information tracking
production engineering computing
pubcrawl170112
Radiation detectors
radiofrequency identification
RFID (Radio Frequency Identification) technology
luxury cosmetics brand
sales methods
security
supply chain channels
supply chain management
supply chains
system-EPC system
visual information management system
analysis and design
information management
hard security phenomena
gray goods
false security phenomena
fake goods
distributed RFID tracking
digital authentication security technology
Databases
counterfeit goods
cosmetics brand distribution channels
cosmetics
cosmetic
brand cosmetics anticounterfeiting system
authentication
anticounterfeiting security system
biblio
A variant of schnorr signature scheme for path-checking in RFID-based supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
pubcrawl170112
telecommunication security
supply chains
supply chain management
Supply Chain
Security analysis
Schnorr signature
RFID-based supply chains
RFID technology
RFID
radiofrequency identification
authentication
Protocols
privacy analysis
privacy
path-checking protocols
path-checking
modified schnorr signature scheme
Generators
data privacy
check reader
biblio
Security on RFID technology
Submitted by grigby1 on Wed, 03/08/2017 - 1:23pm
building access
computing technologies
counterfeiting
Noise measurement
pubcrawl170112
radio frequency identification
radiofrequency identification
RFID
RFID data security
RFID systems
RFID technology
security of data
Security on RFID
supply chains
telecommunication computing
tracking livestock
biblio
"A Mutual Authentication Security RFID Protocol Based on Time Stamp"
Submitted by grigby1 on Thu, 02/23/2017 - 11:03am
privacy security
time stamps
time stamp
security of data
security authentication protocol
RFID technology
RFID
pubcrawl170105 radiofrequency identification
Protocols
PRNG
authentication
privacy
mutual authentication security RFID protocol
mutual authentication
Hash Function
file organisation
encryption
Databases
Cryptographic Protocols