Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
LADP: A lightweight authentication and delegation protocol for RFID tags
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
protocol
telecommunication security
Supply Chain
RFID tags
RFID security
RFID privacy
RFID
Resists
radiofrequency identification
PUF-enabled tags
pubcrawl170112
Protocols
authentication
privacy
physically unclonable function
ownership transfer process
owner privacy protection
lightweight authentication-and-delegation protocol
LADP
delegation
data privacy
Cryptographic Protocols
computation cost reduction
communication cost reduction
biblio
Secure object tracking protocol for Networked RFID Systems
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
security
protocol
Protocols
pubcrawl170112
PUF
radiofrequency identification
radiofrequency identification technology
RFID
secure object tracking protocol
privacy
security protocol description language
SPDL model
supply chains
telecommunication security
tracker
unclonable
visibility
networked RFID system
cryptographic primitive
Cryptographic Protocols
Diffie-Hellman algorithm
distributed system
injection of fake objects
IoT
lawful business operation
Mathematical model
automated claim verification tool Scyther
non-repudiation
NRS
NRS system security
object traceability
object tracking
object visibility
physically unclonable function
biblio
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues
Submitted by grigby1 on Wed, 03/08/2017 - 1:29pm
quadratic residue
supply chains
Supply Chain
Servers
Security analysis
security
secure RFID tag ownership transfer protocol
RFID-OT protocol improvement
RFID
radiofrequency identification
radio frequency identification
Quadratic Residues
cryptanalysis
pubcrawl170112
Protocols
protocol
probability
privacy
Ownership Transfer
Information systems
desynchronization attack
Cryptography
Cryptographic Protocols
biblio
A Mixed and Batching Authentication Protocol for Grouped Tags in Mobile RFID System
Submitted by grigby1 on Wed, 03/08/2017 - 1:29pm
Mobile communication
Wireless communication
tracking attack
Servers
security and privacy
reply attack
radiofrequency identification
pubcrawl170112
Protocols
mutual authentication
mobile RFID system
Mobile RFID
mobile radio frequency identification
authentication
mixed authentication protocol
low cost tags
lightweight authentication
Lightweight
impersonation attack
hash based authentication
Grouping
grouped tags
Databases
Cryptographic Protocols
batching authentication protocol
biblio
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Submitted by grigby1 on Wed, 03/08/2017 - 1:25pm
protocol-based clustering tag
telecommunication security
supply-chain management systems
supply chain management
Servers
Security analysis
security
RFID systems
RFID
radiofrequency identification
radio frequency identification
pubcrawl170112
Protocols
authentication
privacy
mathematical analysis
Intelligent systems
industrial environment
Indexes
healthcare monitoring and
delays
delay analysis
cryptography protocol
Cryptographic Protocols
cryptographic protocol
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks
biblio
Neighborhood area network security in smart grid using security enhanced key updating
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
simple one-way hash function based scheme
PCL
power system security
process analysis toolkit
protocol composition logic
Protocols
pubcrawl170109
SAE protocols
security attacks
security enhanced key updating
PAT
simultaneous authentication of equals protocols
Smart Grid
smart grid infrastructure
Smart Grids
smart power grids
telecommunication security
wireless mesh networks
WMNs
EMSA protocol
Communication networks
Computer crime
Cryptographic Protocols
cyber-attacks
denial of service attack
DoS attack
efficient mesh security association protocols
EMSA
authentication
EMSA protocols
IEEE 802.11s
key refreshment strategy
Logic gates
mesh key holder security handshake
MKHSH
NAN
neighborhood area network security
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
biblio
"A Mutual Authentication Security RFID Protocol Based on Time Stamp"
Submitted by grigby1 on Thu, 02/23/2017 - 11:03am
privacy security
time stamps
time stamp
security of data
security authentication protocol
RFID technology
RFID
pubcrawl170105 radiofrequency identification
Protocols
PRNG
authentication
privacy
mutual authentication security RFID protocol
mutual authentication
Hash Function
file organisation
encryption
Databases
Cryptographic Protocols
biblio
"Multi-path Based Avoidance Routing in Wireless Networks"
Submitted by grigby1 on Tue, 02/14/2017 - 11:52am
multipath message avoidance routing protocol
wireless network
speedy advancement
secure communication
Routing protocols
Routing
radio networks
pubcrawl170102
network coding
coding scheme
multipath channels
MPAR protocol
encryption
encoding
electronic messaging
data encryption
Cryptographic Protocols
computer hardware
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
next ›
last »