Shaoying Cai
Shaoying Cai
Assistant Professor of Cyber Security, Hunan University, China
Geverifieerd e-mailadres voor hnu.edu.cn - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
852009
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
622015
Distributed path authentication for dynamic RFID-enabled supply chains
S Cai, Y Li, Y Zhao
IFIP International Information Security Conference, 501-512, 2012
172012
Analyzing the dangers posed by Chrome extensions
L Bauer, S Cai, L Jia, T Passaro, Y Tian
2014 IEEE Conference on Communications and Network Security, 184-192, 2014
162014
Enabling secure secret updating for unidirectional key distribution in rfid-enabled supply chains
S Cai, T Li, C Ma, Y Li, RH Deng
International conference on information and communications security, 150-164, 2009
162009
A new framework for privacy of RFID path authentication
S Cai, RH Deng, Y Li, Y Zhao
International Conference on Applied Cryptography and Network Security, 473-488, 2012
152012
Achieving high security and efficiency in RFID-tagged supply chains
S Cai, Y Li, T Li, RH Deng, H Yao
International Journal of Applied Cryptography 2 (1), 3-12, 2010
102010
Protecting and restraining the third party in RFID-enabled 3PL supply chains
S Cai, C Su, Y Li, R Deng, T Li
International Conference on Information Systems Security, 246-260, 2010
82010
Ensuring dual security modes in RFID-enabled supply chain systems
S Cai, T Li, Y Li, RH Deng
International Conference on Information Security Practice and Experience …, 2009
72009
Key update at train stations: Two-layer dynamic key update scheme for secure train communications
SY Chang, S Cai, H Seo, YC Hu
International Conference on Security and Privacy in Communication Systems …, 2016
52016
Formal Analysis and Run-time Monitoring of Information Flows in Chromium: Technical Appendix
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
Carnegie Mellon University Pittsburgh United States, 2015
2015
Flexible and Secure Secret Updating for Unidirectional Key Distribution in Rfid-Enabled Supply Chains
S Cai, T Li, C Ma, Y LI, RH DENG
2009
Analysis and Improvements of a Secure E-Tender Submission
S CAI, Y LI, Y ZHAO, Y ZHAO
2008
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.(2009)
S CAI, T LI, Y LI, RH DENG
Information Security and Trust: 5th International Conference, ISPEC 2009 Xi …, 0
Balancing Security with Efficiency in RFID-Tagged Supply Chains
S Cai, T Li, Y Li, RH Deng
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–15