Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFID security
biblio
Security Issues and Challenges in RFID, Wireless Sensor Network and Optical Communication Networks and Solutions
Submitted by grigby1 on Mon, 11/08/2021 - 1:32pm
radiofrequency identification
attacks
Communication networks
composability
Human behavior
Metrics
network security
optical network
Production
Protocols
pubcrawl
WSN
Reliability
resilience
Resiliency
RFID security
security
security and privacy
security goals
sensor networks
sensor security
wireless sensor networks
biblio
Anomaly Detection in RFID Networks Using Bayesian Blocks and DBSCAN
Submitted by grigby1 on Thu, 09/16/2021 - 2:12pm
Radio frequency identification (RFID)
Voronoi cells
Two dimensional displays
traffic characterization
security
RFIDs
RFID security
RFID
Resiliency
resilience
radiofrequency identification
Adaptation models
radio frequency identification
pubcrawl
NFC
IoT
Human behavior
Computational modeling
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Research on RFID Technology Security
Submitted by grigby1 on Thu, 09/16/2021 - 2:10pm
Radio frequency identification (RFID)
security
RFIDs
RFID Vulnerability analysis
RFID security
RFID
Resiliency
resilience
radiofrequency identification
Access Control
radio frequency identification
Radio frequency
pubcrawl
Mifare card
Human behavior
encryption
Databases
authentication
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
modeling technique
traffic characterization
telecommunication traffic
telecommunication security
RFIDs
RFID traffic patterns
RFID traffic models
RFID traces
RFID security
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
piecewise graphs
NFC
Adaptation models
modeling algorithms
Knuth's Rule
ISO standards
IoT
IEC standards
Human Factors
Human behavior
graph theory
Computational modeling
binned RFID command counts
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
LADP: A lightweight authentication and delegation protocol for RFID tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
protocol
telecommunication security
Supply Chain
RFID tags
RFID security
RFID privacy
RFID
Resists
radiofrequency identification
PUF-enabled tags
pubcrawl170112
Protocols
authentication
privacy
physically unclonable function
ownership transfer process
owner privacy protection
lightweight authentication-and-delegation protocol
LADP
delegation
data privacy
Cryptographic Protocols
computation cost reduction
communication cost reduction