Attacks and improvements to an RIFD mutual authentication protocol and its extensions S Cai, Y Li, T Li, RH Deng Proceedings of the second ACM conference on Wireless network security, 51-58, 2009 | 99 | 2009 |
Run-time Monitoring and Formal Analysis of Information Flows in Chromium. L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian NDSS, 2015 | 82 | 2015 |
Analyzing the dangers posed by Chrome extensions L Bauer, S Cai, L Jia, T Passaro, Y Tian 2014 IEEE Conference on Communications and Network Security, 184-192, 2014 | 27 | 2014 |
Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains S Cai, T Li, C Ma, Y Li, RH Deng Information and Communications Security: 11th International Conference …, 2009 | 19 | 2009 |
Distributed path authentication for dynamic RFID-enabled supply chains S Cai, Y Li, Y Zhao IFIP International Information Security Conference, 501-512, 2012 | 17 | 2012 |
A new framework for privacy of RFID path authentication S Cai, RH Deng, Y Li, Y Zhao Applied Cryptography and Network Security: 10th International Conference …, 2012 | 17 | 2012 |
Key update at train stations: Two-layer dynamic key update scheme for secure train communications SY Chang, S Cai, H Seo, YC Hu International Conference on Security and Privacy in Communication Systems …, 2016 | 9 | 2016 |
Protecting and restraining the third party in RFID-enabled 3PL supply chains S Cai, C Su, Y Li, R Deng, T Li Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 9 | 2010 |
Achieving high security and efficiency in RFID-tagged supply chains S Cai, Y Li, T Li, RH Deng, H Yao International Journal of Applied Cryptography 2 (1), 3-12, 2010 | 9 | 2010 |
Ensuring dual security modes in RFID-enabled supply chain systems S Cai, T Li, Y Li, RH Deng Information Security Practice and Experience: 5th International Conference …, 2009 | 7 | 2009 |
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication S Cai, Y Li, C Ma, SSM Chow, RH Deng arXiv preprint arXiv:2210.10244, 2022 | | 2022 |
Formal Analysis and Run-time Monitoring of Information Flows in Chromium: Technical Appendix (CMU-CyLab-14-015) L Bauer, S Cai, T Passaro, M Stroucken, Y Tian Carnegie Mellon University, 2015 | | 2015 |
Analyzing the dangers posed by Chrome Extensions.(2014) L BAUER, S CAI, L JIA, T PASSARO, Y TIAN Proceedings of IEEE Conference on Communications and Network Security, San …, 2014 | | 2014 |
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.(2010) S CAI, C SU, Y LI, RH DENG Information Systems Security: 6th International Conference, ICISS, 17-19, 2010 | | 2010 |
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.(2009) S CAI, T LI, Y LI, RH DENG Information Security and Trust: 5th International Conference, ISPEC, 13-15, 2009 | | 2009 |
Flexible and Secure Secret Updating for Unidirectional Key Distribution in Rfid-Enabled Supply Chains S Cai, T Li, C Ma, Y LI, RH DENG | | 2009 |
Analysis and Improvements of a Secure E-Tender Submission S CAI, Y LI, Y ZHAO, Y ZHAO | | 2008 |
Balancing Security with Efficiency in RFID-Tagged Supply Chains S Cai, T Li, Y Li, RH Deng | | |