Attacks and improvements to an RIFD mutual authentication protocol and its extensions S Cai, Y Li, T Li, RH Deng Proceedings of the second ACM conference on Wireless network security, 51-58, 2009 | 91 | 2009 |
Run-time Monitoring and Formal Analysis of Information Flows in Chromium. L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian NDSS, 2015 | 73 | 2015 |
Analyzing the dangers posed by Chrome extensions L Bauer, S Cai, L Jia, T Passaro, Y Tian 2014 IEEE Conference on Communications and Network Security, 184-192, 2014 | 24 | 2014 |
Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains S Cai, T Li, C Ma, Y Li, RH Deng Information and Communications Security: 11th International Conference …, 2009 | 19 | 2009 |
A new framework for privacy of RFID path authentication S Cai, RH Deng, Y Li, Y Zhao Applied Cryptography and Network Security: 10th International Conference …, 2012 | 18 | 2012 |
Distributed path authentication for dynamic RFID-enabled supply chains S Cai, Y Li, Y Zhao Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 17 | 2012 |
Achieving high security and efficiency in RFID-tagged supply chains S Cai, Y Li, T Li, RH Deng, H Yao International Journal of Applied Cryptography 2 (1), 3-12, 2010 | 10 | 2010 |
Protecting and restraining the third party in RFID-enabled 3PL supply chains S Cai, C Su, Y Li, R Deng, T Li Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 9 | 2010 |
Key update at train stations: Two-layer dynamic key update scheme for secure train communications SY Chang, S Cai, H Seo, YC Hu Security and Privacy in Communication Networks: 12th International …, 2017 | 8 | 2017 |
Ensuring dual security modes in RFID-enabled supply chain systems S Cai, T Li, Y Li, RH Deng Information Security Practice and Experience: 5th International Conference …, 2009 | 7 | 2009 |
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication S Cai, Y Li, C Ma, SSM Chow, RH Deng arXiv preprint arXiv:2210.10244, 2022 | | 2022 |
Formal Analysis and Run-time Monitoring of Information Flows in Chromium: Technical Appendix L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian Carnegie Mellon University Pittsburgh United States, 2015 | | 2015 |
Flexible and Secure Secret Updating for Unidirectional Key Distribution in Rfid-Enabled Supply Chains S Cai, T Li, C Ma, Y LI, RH DENG | | 2009 |
Analysis and Improvements of a Secure E-Tender Submission S CAI, Y LI, Y ZHAO, Y ZHAO | | 2008 |
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.(2009) S CAI, T LI, Y LI, RH DENG Information Security and Trust: 5th International Conference, ISPEC 2009 Xi …, 0 | | |
Balancing Security with Efficiency in RFID-Tagged Supply Chains S Cai, T Li, Y Li, RH Deng | | |