Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFID system
biblio
Learning Automata Based Secure Multi Agent RFID Authentication System
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
RFID tags
RFIDs
utility function
technological developments
Scyther
RFID technologies
RFID scenario
multiagent intelligent system
Multi Agent
long term benefit
learning automata
expertly transfer utility
automata based secure multiagent RFID authentication system
RFID system
security
radiofrequency identification
sensitive data
RFID
authentication
privacy
multi-agent systems
radio frequency identification
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Research on RFID Information Security Technology Based on Elliptic Curve Algorithms
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
security mechanism
RFIDs
traditional RSA public key cryptography
storage space
RFID system
RFID information security technology
RFID information security
potential security hazard
hardware conditions
elliptic curve algorithms
elliptic curve algorithm
encryption
radiofrequency identification
Elliptic curves
Elliptic curve cryptography
security problem
public key cryptography
Mathematical model
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
A lightweight RFID authentication protocol with confidentiality and anonymity
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
privacy
telecommunication security
RFIDs
RFID tags
RFID system
RFID
Resiliency
replay attack
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
protocol
privacy and security
authentication
open wireless radio wave
on-chip CRC function
low-cost passive tags
location trace
lightweight RFID authentication protocol
Internet of Things
Human Factors
Human behavior
Hash functions
eavesdropping prevention
DOS-attack prevention
Cryptography
Cryptographic Protocols
CRC