Shaoying Cai

According to our database1, Shaoying Cai authored at least 11 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication.
CoRR, 2022

2016
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

2015
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Analyzing the dangers posed by Chrome extensions.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2012
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains.
Proceedings of the Information Security and Privacy Research, 2012

A New Framework for Privacy of RFID Path Authentication.
Proceedings of the Applied Cryptography and Network Security, 2012

2010
Achieving high security and efficiency in RFID-tagged supply chains.
Int. J. Appl. Cryptogr., 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
Proceedings of the Information Security Practice and Experience, 2009

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009


  Loading...