Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
RFID security
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
data privacy
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
privacy attacks
public key cryptography
man-in-the-middle attack
object detection
privacy protection
radiofrequency identification
RFID technology
RFID system
elliptical curve cryptographic solutions
Elliptical Curve Cryptography
Hash Function
Hash function ZKP
Keccak hash function
MITM
radio frequency identification technology
RFID Authentication
RFID authentication protocol
RFID privacy
RFID security
Schnorr identification protocol
RFIDs
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
Adaptation models
Anomaly Detection
anomaly/intrusion detection
Bayes methods
Bayesian Blocks
binned RFID command counts
Computational modeling
graph theory
Human behavior
Human Factors
IEC standards
IoT
ISO standards
Knuth's Rule
modeling algorithms
modeling technique
NFC
piecewise graphs
pubcrawl
radiofrequency identification
resilience
Resiliency
RFID
RFID security
RFID traces
RFID traffic models
RFID traffic patterns
RFIDs
telecommunication security
telecommunication traffic
traffic characterization
biblio
LADP: A lightweight authentication and delegation protocol for RFID tags
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
authentication
communication cost reduction
computation cost reduction
Cryptographic Protocols
data privacy
delegation
LADP
lightweight authentication-and-delegation protocol
owner privacy protection
ownership transfer process
physically unclonable function
privacy
protocol
Protocols
pubcrawl170112
PUF-enabled tags
radiofrequency identification
Resists
RFID
RFID privacy
RFID security
RFID tags
Supply Chain
telecommunication security