Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Shaoying Cai"'
Autor:
Shaoying CAI
Supply chain is a network involving multiple parties such as suppliers, transporters, storage facilities, distributors, and retailers that participate in the production, delivery, and sale of a product. It is difficult to monitor a supply chain since
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::08331ad290ec2624f6090dfd5929ec6e
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319596075
SecureComm
SecureComm
Modern train systems adopt communication-based train control (CBTC), which uses wireless communications to better monitor and control the train operations. Despite the well-studied security issues in wireless networking in information technology appl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::51a6c5bf313de3fe8343406a43959796
https://doi.org/10.1007/978-3-319-59608-2_7
https://doi.org/10.1007/978-3-319-59608-2_7
Publikováno v:
NDSS
Web browsers are a key enabler of a wide range of online services, from shopping and email to banking and health services. Because these services frequently involve handling sensitive data, a wide range of web browser security policies and mechanisms
This document is the technical appendix for the following paper: L. Bauer, S. Cai, L. Jia, T. Passaro, M. Stroucken, and Y. Tian. Run-time monitoring and formal analysis of information flows in Chromium. In Proceedings of the 22nd Annual Network & Di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7755fee640a1573859dce44ed1fe44eb
Publikováno v:
CNS
A common characteristic of modern web browsers is that their functionality can be extended via third-party addons. In this paper we focus on Chrome extensions, to which the Chrome browser exports a rich API: extensions can potentially make network re
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642304354
SEC
SEC
In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5f3256d502412c41251cdc13dd9b7101
https://doi.org/10.1007/978-3-642-30436-1_41
https://doi.org/10.1007/978-3-642-30436-1_41
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783642312830
ACNS
ACNS
RFID-based path authentication enables supply chain managers to verify the exact path that a tag has taken. In this paper, we introduce a new oracle Move that models a tag's movement along a designed or an arbitrary path in a supply chain. With this
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8d7e8485ad920c82e533100104e0b117
https://doi.org/10.1007/978-3-642-31284-7_28
https://doi.org/10.1007/978-3-642-31284-7_28
Publikováno v:
Information Systems Security ISBN: 9783642177132
ICISS
ICISS
"Symmetric secret"-based RFID systems are widely adopted in supply chains. In such RFID systems, a reader's ability to identify a RFID tag relies on the possession of the tag's secret which is usually only known by its owner. If a "symmetric secret"-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a4aa01725b10b8b6cf3c085c9e296430
https://doi.org/10.1007/978-3-642-17714-9_18
https://doi.org/10.1007/978-3-642-17714-9_18
Publikováno v:
WISEC
In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover tha
Publikováno v:
Information and Communications Security ISBN: 9783642111440
ICICS
ICICS
In USENIX Security 08, Juels, Pappu and Parno proposed a secret sharing based mechanism to alleviate the key distribution problem in RFID-enabled supply chains. Compared to existing pseudonym based RFID protocols, the secret sharing based solution is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b952f6371cc6428cf6e005d56b1615e
https://doi.org/10.1007/978-3-642-11145-7_13
https://doi.org/10.1007/978-3-642-11145-7_13