UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite  |  View/Download:2/0  |  Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Internet of things' authentication and access control Journal article
International Journal of Security and Networks, 2012,Volume: 7,Issue: 4,Page: 228-241
Authors:  Liu J.;  Xiao Y.;  Chen C.L.P.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/11
Access control  Authentication  IoT  RFID  Security  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:798/158  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
Integrating RFID technology in Internet applications Conference paper
Communications in Computer and Information Science, Ankara, TURKEY, JUN 26-28, 2011
Authors:  Simon Fong
Favorite  |  View/Download:4/0  |  Submit date:2019/02/13
Internet Applications  Rfid  Wireless Communication  
Security in Physical Environments: Algorithms and System for Automated Detection of Suspicious Activity Conference paper
Proceedings of the Workshop on Behavior Informatics, Hyderabad, India, 2010
Authors:  Biuk-Aghau, Robert P;  Si, Yain-Whar;  Fong, Simon;  Yan, Peng-Fan
Favorite  |  View/Download:6/0  |  Submit date:2019/05/17
Access Pattern  User Behaviour  Secure Physical Environment  Detection  Generation  
Detection of Suspicious Patterns in Secure Physical Environments Conference paper
Fourth International Conference on Information Technology and Applications, ICITA 2007, Sydney, Australia, January 2007
Authors:  Pengfan Yan;  Robert P. Biuk-Aghai;  Simon Fong;  Yain-Whar Si
Favorite  |  View/Download:9/0  |  Submit date:2019/02/13
Data Mining  Rfid  Security  
Emerging Directions in Embedded and Ubiquitous Computing Book
Berlin, Germany:Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2006
Authors:  Denko, M.;  Shih, C.-S.;  Li, K.-C.;  Tsao, S.-L.;  Zeng, Q.-A.;  Park, S.-H.;  Ko, Y.-B.;  Hung, S.-H.;  Park, J.H
Favorite  |  View/Download:1/0  |  Submit date:2019/08/02