Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFID systems
biblio
Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
KP-ABE
threshold grouping-proofs
Security analysis
Scalability
RFID systems
radiofrequency identification
Public key
pubcrawl
policy-based governance
Pairing Cryptography
message encryption
KP-ABE protocol
Access Control
key-policy attribute-based encryption
key policy attribute based encryption
IoT applications
Internet of Things
grouping-proofs based access control
Grouping proofs
encryption
Cryptographic Protocols
collaboration
authorize NFC payment
authorisation
biblio
Novel Hybrid Physical Layer Security Technique in RFID Systems
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
directive antennas
RFIDs
RFID tag information confidentiality
receiving antennas
radio frequency identification backscatter communications
PHY layer security technique
PHY layer security
one dimensional antenna array
noise injection security technique
noise injection
hybrid physical layer security
eavesdroppers attacks
telecommunication security
beam steering
backscatter channel
backscatter
RFID systems
RFID
radiofrequency identification
antenna arrays
pubcrawl
Human behavior
Resiliency
security
biblio
Investigating Attacks to Improve Security and Privacy in RFID Systems Using the Security Bit Method
Submitted by grigby1 on Wed, 10/02/2019 - 2:02pm
radiofrequency identification
wireless device
telecommunication security
security bit method
security
RFIDs
RFID technology
RFID tags
RFID tag
RFID systems
RFID security development
RFID reader
RFID
Resiliency
resilience
counterfeit
Radio frequency identification (RFID)
radio frequency identification
Radar
pubcrawl
privacy problems
privacy
Object recognition
Human Factors
Human behavior
Electronic Product Code (EPC)
Digital Information
Databases
data privacy
biblio
Mutual Authentication Protocol for RFID Based on ECC
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Public key
tracking attacks
telecommunication security
system internal attack
Servers
security scalability
security protocol
Scalability
RFID systems
Resists
Resiliency
radiofrequency identification
radio frequency identification
authentication
pubcrawl
Protocols
mutual authentication protocol
mutual authentication
Metrics
Internet of things security and privacy
forward security
Elliptic curve cryptography
ECC
Denial of Service attacks
Cryptographic Protocols
camouflage attacks
biblio
Security analysis of the RBS block cipher
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
radiofrequency identification
Wireless communication
Time Frequency Analysis
Time complexity
telecommunication security
Security analysis
security
Scalability
S-box
RFID systems
Resiliency
RBS design
RBS block cipher
radiofrequency identification systems
Algorithm design and analysis
pubcrawl
P-box
Metrics
lightweight encryption algorithm
encryption key
encryption
decryptions
data complexity
Cryptography
conventional block cipher elements
computational complexity
Ciphers
authentication
biblio
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Submitted by grigby1 on Wed, 03/08/2017 - 1:25pm
protocol-based clustering tag
telecommunication security
supply-chain management systems
supply chain management
Servers
Security analysis
security
RFID systems
RFID
radiofrequency identification
radio frequency identification
pubcrawl170112
Protocols
authentication
privacy
mathematical analysis
Intelligent systems
industrial environment
Indexes
healthcare monitoring and
delays
delay analysis
cryptography protocol
Cryptographic Protocols
cryptographic protocol
biblio
Security on RFID technology
Submitted by grigby1 on Wed, 03/08/2017 - 1:23pm
building access
computing technologies
counterfeiting
Noise measurement
pubcrawl170112
radio frequency identification
radiofrequency identification
RFID
RFID data security
RFID systems
RFID technology
security of data
Security on RFID
supply chains
telecommunication computing
tracking livestock