Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
RFIDs
biblio
Learning Automata Based Secure Multi Agent RFID Authentication System
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
security
data privacy
telecommunication security
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
radio frequency identification
multi-agent systems
privacy
authentication
RFID
sensitive data
radiofrequency identification
RFID tags
RFID system
automata based secure multiagent RFID authentication system
expertly transfer utility
learning automata
long term benefit
Multi Agent
multiagent intelligent system
RFID scenario
RFID technologies
Scyther
technological developments
utility function
RFIDs
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
Algorithm
Boolean expression reconstruction
Boolean functions
Ciphers
Cryptography
Differential Power Analysis
DPA attack
DPA protection technology threshold
field programmable gate arrays
FPGA
Human behavior
Internet of Things
InvS-box
LED lightweight cryptographic algorithm
LED lightweight cryptography
light emitting diodes
Piccolo cryptographic algorithm
pubcrawl
radio frequency identification tags
radiofrequency identification
Resiliency
RFID tag
RFID tag chip
RFID tags
RFIDs
search problems
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
data privacy
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
privacy attacks
public key cryptography
man-in-the-middle attack
object detection
privacy protection
radiofrequency identification
RFID technology
RFID system
elliptical curve cryptographic solutions
Elliptical Curve Cryptography
Hash Function
Hash function ZKP
Keccak hash function
MITM
radio frequency identification technology
RFID Authentication
RFID authentication protocol
RFID privacy
RFID security
Schnorr identification protocol
RFIDs
biblio
Novel Hybrid Physical Layer Security Technique in RFID Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
telecommunication security
security
Resiliency
Human behavior
pubcrawl
antenna arrays
radiofrequency identification
RFID
RFID systems
backscatter
backscatter channel
beam steering
directive antennas
eavesdroppers attacks
hybrid physical layer security
noise injection
noise injection security technique
one dimensional antenna array
PHY layer security
PHY layer security technique
radio frequency identification backscatter communications
receiving antennas
RFID tag information confidentiality
RFIDs
biblio
UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic Algorithm
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
Cryptography
Internet of Things
telecommunication security
Resiliency
Human behavior
pubcrawl
information security
radiofrequency identification
RFID technology
anticounterfeiting authentication identification code
data security protection
domestic cryptographic algorithm
intelligent manufacturing
SM7 domestic cryptographic algorithm
tag information
transmission encryption
UHF RFID information security transmission technology
UHF RFID tag
RFIDs
biblio
Research on RFID Information Security Technology Based on Elliptic Curve Algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
encryption
telecommunication security
Resiliency
Human behavior
pubcrawl
Mathematical model
public key cryptography
security problem
Elliptic curve cryptography
Elliptic curves
radiofrequency identification
security mechanism
elliptic curve algorithm
elliptic curve algorithms
hardware conditions
potential security hazard
RFID information security
RFID information security technology
RFID system
storage space
traditional RSA public key cryptography
RFIDs
biblio
RFID-assisted Continuous User Authentication for IoT-based Smart Farming
Submitted by aekwall on Mon, 03/23/2020 - 1:32pm
Servers
authorization
Internet of Things
security
Resiliency
Human behavior
pubcrawl
Business
sustainable development
authentication
public domain software
message authentication
security architecture
radiofrequency identification
RFID
Agriculture
groupware
Decision support systems
electronic data interchange
agricultural contractors
agricultural machines
collaborative agricultural processes
farm management information systems
farm-internal interconnection
FMIS
in-field data exchange
interconnected machinery
IoT-based smart Farming
machine data
Machinery
Management information systems
NFC
Radio Frequency Identification-based continuous user authentication
RFID-assisted continuous user authentication
Smart Farming
sustainable resource management
RFIDs
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
Adaptation models
Anomaly Detection
anomaly/intrusion detection
Bayes methods
Bayesian Blocks
binned RFID command counts
Computational modeling
graph theory
Human behavior
Human Factors
IEC standards
IoT
ISO standards
Knuth's Rule
modeling algorithms
modeling technique
NFC
piecewise graphs
pubcrawl
radiofrequency identification
resilience
Resiliency
RFID
RFID security
RFID traces
RFID traffic models
RFID traffic patterns
RFIDs
telecommunication security
telecommunication traffic
traffic characterization
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
access control system
authentication
authorisation
blockchain
blockchain-based mutual authentication security protocol
Computers
credit card
Cryptographic Protocols
distributed environment
distributed RFID systems
distributed system
high security demand
Human behavior
Human Factors
identity related information
potential attacks
privacy
Protocols
pubcrawl
radio frequency identification technology
radiofrequency identification
resilience
Resiliency
RFID
RFIDs
security
Servers
SQL
SQL injection attack
Supply Chain
biblio
A Secure and Efficient Parallel-Dependency RFID Grouping-Proof Protocol
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
Cryptographic Protocols
data privacy
Elliptic curve cryptography
grouping-proofs
Human behavior
Human Factors
improved offline protocol
missing tags
parallel protocol
parallel-dependency grouping-proof protocol
parallel-dependency RFID grouping-proof protocol
privacy
Protocols
pubcrawl
radio frequency identification
radiofrequency identification
resilience
Resiliency
RFID
RFID tagged objects group
RFIDs
robust privacy mechanisms
Scalability
security
serial-dependent grouping-proof protocol
Sundaresan grouping-proof protocols
telecommunication security
1
2
3
4
next ›
last »