Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFIDs
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
LED lightweight cryptographic algorithm
search problems
RFIDs
RFID tags
RFID tag chip
RFID tag
Resiliency
radiofrequency identification
radio frequency identification tags
pubcrawl
Piccolo cryptographic algorithm
light emitting diodes
LED lightweight cryptography
Algorithm
InvS-box
Internet of Things
Human behavior
FPGA
field programmable gate arrays
DPA protection technology threshold
DPA attack
Differential Power Analysis
Cryptography
Ciphers
Boolean functions
Boolean expression reconstruction
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Novel Hybrid Physical Layer Security Technique in RFID Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
directive antennas
RFIDs
RFID tag information confidentiality
receiving antennas
radio frequency identification backscatter communications
PHY layer security technique
PHY layer security
one dimensional antenna array
noise injection security technique
noise injection
hybrid physical layer security
eavesdroppers attacks
telecommunication security
beam steering
backscatter channel
backscatter
RFID systems
RFID
radiofrequency identification
antenna arrays
pubcrawl
Human behavior
Resiliency
security
biblio
UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic Algorithm
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
anticounterfeiting authentication identification code
RFIDs
UHF RFID tag
UHF RFID information security transmission technology
transmission encryption
tag information
SM7 domestic cryptographic algorithm
intelligent manufacturing
domestic cryptographic algorithm
data security protection
Cryptography
RFID technology
radiofrequency identification
information security
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
biblio
Research on RFID Information Security Technology Based on Elliptic Curve Algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
security mechanism
RFIDs
traditional RSA public key cryptography
storage space
RFID system
RFID information security technology
RFID information security
potential security hazard
hardware conditions
elliptic curve algorithms
elliptic curve algorithm
encryption
radiofrequency identification
Elliptic curves
Elliptic curve cryptography
security problem
public key cryptography
Mathematical model
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
RFID-assisted Continuous User Authentication for IoT-based Smart Farming
Submitted by aekwall on Mon, 03/23/2020 - 1:32pm
machine data
agricultural contractors
agricultural machines
collaborative agricultural processes
farm management information systems
farm-internal interconnection
FMIS
in-field data exchange
interconnected machinery
IoT-based smart Farming
electronic data interchange
Machinery
Management information systems
NFC
Radio Frequency Identification-based continuous user authentication
RFID-assisted continuous user authentication
Smart Farming
sustainable resource management
RFIDs
authentication
authorization
Internet of Things
security
Resiliency
Human behavior
pubcrawl
Business
sustainable development
Servers
public domain software
message authentication
security architecture
radiofrequency identification
RFID
Agriculture
groupware
Decision support systems
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
modeling technique
traffic characterization
telecommunication traffic
telecommunication security
RFIDs
RFID traffic patterns
RFID traffic models
RFID traces
RFID security
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
piecewise graphs
NFC
Adaptation models
modeling algorithms
Knuth's Rule
ISO standards
IoT
IEC standards
Human Factors
Human behavior
graph theory
Computational modeling
binned RFID command counts
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
potential attacks
Supply Chain
SQL injection attack
SQL
Servers
security
RFIDs
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification technology
pubcrawl
Protocols
privacy
access control system
identity related information
Human Factors
Human behavior
high security demand
distributed system
distributed RFID systems
distributed environment
Cryptographic Protocols
credit card
Computers
blockchain-based mutual authentication security protocol
blockchain
authorisation
authentication
biblio
A Secure and Efficient Parallel-Dependency RFID Grouping-Proof Protocol
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
pubcrawl
telecommunication security
Sundaresan grouping-proof protocols
serial-dependent grouping-proof protocol
security
Scalability
robust privacy mechanisms
RFIDs
RFID tagged objects group
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification
Cryptographic Protocols
Protocols
privacy
parallel-dependency RFID grouping-proof protocol
parallel-dependency grouping-proof protocol
parallel protocol
missing tags
improved offline protocol
Human Factors
Human behavior
grouping-proofs
Elliptic curve cryptography
data privacy
biblio
Lightweight Security Protocol for Chipless RFID in Internet of Things (IoT) Applications
Submitted by grigby1 on Wed, 10/02/2019 - 3:02pm
privacy
tag/reader anonymity
security
Secuity
RFIDs
RFID tags
RFID based communication
RFID
Resiliency
resilience
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
BASYS 2 FPGA board based platform
lightweight security protocol
lightweight collision free algorithm
IoT
Internet of Things
Human Factors
Human behavior
field programmable gate arrays
Databases
Cryptographic Protocols
chipless RFID tag based system
chipless RFID system
Chipless RFID
broader IoT framework
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »