Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFID tags
biblio
Investigating Attacks to Improve Security and Privacy in RFID Systems Using the Security Bit Method
Submitted by grigby1 on Wed, 10/02/2019 - 3:02pm
radiofrequency identification
wireless device
telecommunication security
security bit method
security
RFIDs
RFID technology
RFID tags
RFID tag
RFID systems
RFID security development
RFID reader
RFID
Resiliency
resilience
counterfeit
Radio frequency identification (RFID)
radio frequency identification
Radar
pubcrawl
privacy problems
privacy
Object recognition
Human Factors
Human behavior
Electronic Product Code (EPC)
Digital Information
Databases
data privacy
biblio
Universally Composable RFID Mutual Authentication
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
security notion
public key update protocols
radiofrequency identification
readers corruptions
Resiliency
RFID Authentication
RFID mutual authentication protocols
RFID tags
Scalability
public key infrastructure
tags corruptions
trusted certificates
trusted cryptographic protocols
trusted third parties
universal composability
universally composable framework
zero-knowledge privacy model
adversary model
public key encryption
public key cryptography
Public key
pubcrawl
Protocols
privacy
PKI Trust Models
Metrics
message authentication code
Human Factors
Human behavior
Cryptographic Protocols
cryptographic protocol
authentication
arbitrary environment
biblio
Product authentication using hash chains and printed QR codes
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Protocols
statically printed QR codes
static tag based hash chains
static code
Servers
security threats
security characteristics
RFID tags
Resiliency
QR codes
pubcrawl
authentication
production engineering computing
product authentication
printed tags
hash-chain
cyber physical systems
Cryptography
counterfeit goods
cost-efficient scheme
Computer crime
biblio
New clone-detection approach for RFID-based supply chains
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
radiofrequency identification
telecommunication security
tag tracing
supply chains
supply chain partners
Servers
security issues
RFIDs
RFID-based supply chains
RFID technology
RFID tags
RFID tag
RFID monitoring schemes
RFID
Resiliency
authentication
radio-frequency identification
pubcrawl
NVM
Nonvolatile memory
low-cost wireless method
Human Factors
Human behavior
encoded local database
Databases
counterfeit product injection detection
Cloning
clone-detection approach
back-end database
biblio
One-Round Provably Secure Yoking-Proof for RFID Applications
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy protection
yoking-proof
tools
RFIDs
RFID tags
RFID tagged objects
RFID tag pair
RFID applications
RFID
Resiliency
radiofrequency identification
pubcrawl
provable security
authentication
privacy model
privacy
one-round provably secure yoking-proof
one-round offline yoking-proof scheme
Moriyama security model
IoT
Internet of Things
Human Factors
Human behavior
data privacy
Cryptography
biblio
A lightweight RFID authentication protocol with confidentiality and anonymity
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy
telecommunication security
RFIDs
RFID tags
RFID system
RFID
Resiliency
replay attack
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
protocol
privacy and security
authentication
open wireless radio wave
on-chip CRC function
low-cost passive tags
location trace
lightweight RFID authentication protocol
Internet of Things
Human Factors
Human behavior
Hash functions
eavesdropping prevention
DOS-attack prevention
Cryptography
Cryptographic Protocols
CRC
biblio
Adjustable security for RFID-equipped IoT devices
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
MQTT
wireless sensor networks
usability
security
RFIDs
RFID tags
RFID
Resiliency
pubcrawl
authentication
Metrics
Mass production
IoT security
IoT
Human Factors
Human behavior
composability
biblio
LADP: A lightweight authentication and delegation protocol for RFID tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
protocol
telecommunication security
Supply Chain
RFID tags
RFID security
RFID privacy
RFID
Resists
radiofrequency identification
PUF-enabled tags
pubcrawl170112
Protocols
authentication
privacy
physically unclonable function
ownership transfer process
owner privacy protection
lightweight authentication-and-delegation protocol
LADP
delegation
data privacy
Cryptographic Protocols
computation cost reduction
communication cost reduction
biblio
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
NIST randomness test
telecommunication security
symmetric-key cryptographic operations
Security analysis
RFID tags
randomness test
random number generation
radiofrequency identification
pubcrawl170112
polynomials
NIST SP800-22
cryptanalysis
NIST
low-cost RFID tags
lightweight pseudorandom number generators
lightweight PRNG
LFSR-based PRNG security
international RFID standards
Generators
EPC Gen2 tags
EPC Gen2 RFID tag
Cryptography
biblio
A fair exchange and track system for RFID-tagged logistic chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
radiofrequency identification
verifiably encrypted signature
telecommunication security
supply chains
Supply Chain
RFID tags
RFID tagged supply chains
RFID tagged logistic chains
RFID
Receivers
cryptographic attestation
radio receivers
radio frequency identification
pubcrawl170112
Protocols
logistics operations
Iron
fair exchange techniques
fair exchange
Cryptography
« first
‹ previous
1
2