-
Chapter and Conference Paper
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach
Flash loan has become one of the most creative tools in DeFi industry. The explosive development of flash loan is due to its circumvention to borrower default risk and platform liquidity risk. But it also grea...
-
Article
Open AccessHybrid repair of aberrant right subclavian artery with aortic dissection caused by Kommerell diverticulum
Aberrant right subclavian artery (ARSA) with associated Kommerell diverticulum (KD) is a rare congenital aortic disease. KD patients have a high risk of rupture, dissection, and compression of adjacent structu...
-
Chapter and Conference Paper
Authenticated CAN Communications Using Standardized Cryptographic Techniques
In the near future, connected vehicles are expected to offer the commuters even more convenience and self-autonomy, but at the same time be exposed to much more attacks. A particularly insidious threat to vehi...
-
Chapter and Conference Paper
Circulation System Modelling with National Implantable Ventricular Assist Device (NIVAD): Hydrodynamic Characters, Hemolysis Test in Vitro and Animal Experiments
This study is to detect the flow field characters of NIVAD and the hemolysis test in vitro and to evaluate the hemodynamic performance and the influence on calves. The flow field characters of NIVAD were calcu...
-
Chapter and Conference Paper
Secure and Practical Key Distribution for RFID-Enabled Supply Chains
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure key distribution problem on a peer-to-peer base. In our model, we focus on any pair of consecutive parties along...
-
Chapter and Conference Paper
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol
In 2010, Yeh, Lo and Winata [1] proposed a process-oriented ultralightweight RFID authentication protocol. This protocol is claimed to provide strong security and robust privacy protection, while at the same t...
-
Chapter and Conference Paper
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
The design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many algorithms have been published lately. In this paper, we analyze two recent prop...
-
Chapter and Conference Paper
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains
“Symmetric secret”-based RFID systems are widely adopted in supply chains. In such RFID systems, a reader’s ability to identify a RFID tag relies on the possession of the tag’s secret which is usually only kno...
-
Chapter and Conference Paper
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important re...
-
Chapter and Conference Paper
Insights into Malware Detection and Prevention on Mobile Phones
The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable I...
-
Chapter and Conference Paper
A Security and Performance Evaluation of Hash-Based RFID Protocols
In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the lev...
-
Chapter and Conference Paper
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
In ASIACCS’08, Burmester, Medeiros and Motta proposed an anonymous RFID authentication protocol (BMM protocol [2]) that preserves the security and privacy properties, and achieves better scalability compared w...
-
Chapter and Conference Paper
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains
In USENIX Security 08, Juels, Pappu and Parno proposed a secret sharing based mechanism to alleviate the key distribution problem in RFID-enabled supply chains. Compared to existing pseudonym based RFID protoc...
-
Chapter
RFID Anticounterfeiting: An Architectural Perspective
Counterfeit goods have always been an enormous threat to the world economy, but they could potentially be combatted by employing an emerging technology – Radio Frequency IDentification (RFID) — in the near fut...
-
Chapter and Conference Paper
More on Shared-Scalar-Product Protocols
Secure scalar product protocols provide fundamental security components for distributed data mining with privacy concerns. This paper makes two contributions in the shared-scalar-product protocols. In the firs...
-
Chapter and Conference Paper
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications
Privacy-preserving clustering algorithms group similar databases populated at distributed locations to improve data qualities and enable accurate data analysis and thus provide fundamental security components ...
-
Chapter and Conference Paper
Preventing Web-Spoofing with Automatic Detecting Security Indicator
The anti-spoofing community has been intensively proposing new methods for defending against new spoofing techniques. It is still challenging for protecting naïve users from advanced spoofing attacks. In this ...
-
Chapter and Conference Paper
Protecting Group Dynamic Information in Large Scale Multicast Groups
Existing key management schemes can secure group communication efficiently, but are failed on protecting the Group Dynamic Information (GDI) that may undermine group privacy. Recently, Sun et al.
-
Chapter and Conference Paper
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks
In this paper, a refined sequential aggregate signature scheme from RSA that works for any modulus is presented, then a compact stimulation mechanism without a central, trusted authority for routing discovery ...
-
Chapter and Conference Paper
Improving Sensor Network Security with Information Quality
With extremely limited resources, it is hard to protect sensor networks well with conventional security mechanisms. We study a class of passive fingerprinting techniques and propose an innovative information qual...