Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170112
biblio
A fair exchange and track system for RFID-tagged logistic chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
radiofrequency identification
verifiably encrypted signature
telecommunication security
supply chains
Supply Chain
RFID tags
RFID tagged supply chains
RFID tagged logistic chains
RFID
Receivers
cryptographic attestation
radio receivers
radio frequency identification
pubcrawl170112
Protocols
logistics operations
Iron
fair exchange techniques
fair exchange
Cryptography
biblio
Cybersecurity for product lifecycle management a research roadmap
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
encryption
three-dimensional printing
supply chain management
secure supply chains
secure collaboration techniques
research roadmap
remote 3D printing
pubcrawl170112
product lifecycle management
product life cycle management
PLM
insider threat
groupware
Access Control
embedded systems
DBSAFE
Data Security
Cybersecurity
critical protection techniques
computer security
compliance techniques
Companies
collaboration
authorisation
access control systems
biblio
RFID integrated QR code tag antenna
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
QR code tag antenna
UHF antennas
telecommunication security
tag
supply-chain management
security applications
RFID tag antenna design
RFID
Resonant frequency
radiofrequency identification
quick response code
QR codes
antenna
QR code
pubcrawl170112
microstrip antennas
ISM frequency band
frequency 2.45 GHz
Electronic mail
data communication
bar code antenna
antennas
Antenna measurements
biblio
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
quadratic residue
supply chains
Supply Chain
Servers
Security analysis
security
secure RFID tag ownership transfer protocol
RFID-OT protocol improvement
RFID
radiofrequency identification
radio frequency identification
Quadratic Residues
cryptanalysis
pubcrawl170112
Protocols
protocol
probability
privacy
Ownership Transfer
Information systems
desynchronization attack
Cryptography
Cryptographic Protocols
biblio
The Design of Brand Cosmetics Anti-counterfeiting System Based on RFID Technology
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
RFID technology
nonsecurity phenomena
product logistics information tracing
product logistics information tracking
production engineering computing
pubcrawl170112
Radiation detectors
radiofrequency identification
RFID (Radio Frequency Identification) technology
luxury cosmetics brand
sales methods
security
supply chain channels
supply chain management
supply chains
system-EPC system
visual information management system
analysis and design
information management
hard security phenomena
gray goods
false security phenomena
fake goods
distributed RFID tracking
digital authentication security technology
Databases
counterfeit goods
cosmetics brand distribution channels
cosmetics
cosmetic
brand cosmetics anticounterfeiting system
authentication
anticounterfeiting security system
biblio
A Mixed and Batching Authentication Protocol for Grouped Tags in Mobile RFID System
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
Mobile communication
Wireless communication
tracking attack
Servers
security and privacy
reply attack
radiofrequency identification
pubcrawl170112
Protocols
mutual authentication
mobile RFID system
Mobile RFID
mobile radio frequency identification
authentication
mixed authentication protocol
low cost tags
lightweight authentication
Lightweight
impersonation attack
hash based authentication
Grouping
grouped tags
Databases
Cryptographic Protocols
batching authentication protocol
biblio
A Modelling Framework for Managing Risk-Based Checkpoint Screening Systems with Two-Type Inspection Queues
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
pubcrawl170112
two-type inspection queues
supply chains
Steady-state
Stability analysis
Selectee Lanes
security checkpoints
security checkpoint
security
risk-based checkpoint screening system management
risk level
queueing theory
Airports
optimization model
optimisation
Normal Lanes
National security
multi-server queue
mix-integer non-linear programming model
inspection queues
Inspection
delays
congestion
Biological system modeling
biblio
DoS Protection in the Cloud through the SPECS Services
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
FP7-ICT programme project
supply chains
SPECS service
security-as-a-service
security SLA-based approach
security service level agreement
Security Metrics
pubcrawl170112
OSSEC
Monitoring
Measurement
Cloud Computing
DoS protection
DoS attacks
DoS attack
contracts
Containers
computer network security
Computer crime
cloud security monitoring
cloud environment
biblio
SLA-Based Secure Cloud Application Development: The SPECS Framework
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
security of data
user-defined security feature
Unified modeling language
supply chains
SPECS framework
SPECS
SLA-based secure cloud application development
security-enhanced service
security-as-a-service
security SLA
security service level agreement
API
security
secure Web server
Secure Cloud Application Development
pubcrawl170112
Monitoring
contracts
Context
Cloud Computing
application program interfaces
biblio
Data supply chain in Industrial Internet
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Metals
Web Protocol
visionary data supply chain
supply chains
standards
Punching
pubcrawl170112
Protocols
Production facilities
Open Messaging Interface
business data processing
IoT
internet
industry business activities
industrial Internet application architecture
industrial internet
Data processing
Data collection
data analysis
computer architecture
« first
‹ previous
1
2
3
4
5
6
next ›
last »