Follow
Shaoying Cai
Shaoying Cai
Assistant Professor of Cyber Security, Hunan University, China
Verified email at hnu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
922009
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
802015
Analyzing the dangers posed by Chrome extensions
L Bauer, S Cai, L Jia, T Passaro, Y Tian
2014 IEEE Conference on Communications and Network Security, 184-192, 2014
262014
Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains
S Cai, T Li, C Ma, Y Li, RH Deng
Information and Communications Security: 11th International Conference …, 2009
192009
Distributed path authentication for dynamic RFID-enabled supply chains
S Cai, Y Li, Y Zhao
IFIP International Information Security Conference, 501-512, 2012
172012
A new framework for privacy of RFID path authentication
S Cai, RH Deng, Y Li, Y Zhao
Applied Cryptography and Network Security: 10th International Conference …, 2012
172012
Key update at train stations: Two-layer dynamic key update scheme for secure train communications
SY Chang, S Cai, H Seo, YC Hu
International Conference on Security and Privacy in Communication Systems …, 2016
92016
Protecting and restraining the third party in RFID-enabled 3PL supply chains
S Cai, C Su, Y Li, R Deng, T Li
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
92010
Achieving high security and efficiency in RFID-tagged supply chains
S Cai, Y Li, T Li, RH Deng, H Yao
International Journal of Applied Cryptography 2 (1), 3-12, 2010
92010
Ensuring dual security modes in RFID-enabled supply chain systems
S Cai, T Li, Y Li, RH Deng
Information Security Practice and Experience: 5th International Conference …, 2009
72009
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication
S Cai, Y Li, C Ma, SSM Chow, RH Deng
arXiv preprint arXiv:2210.10244, 2022
2022
Formal Analysis and Run-time Monitoring of Information Flows in Chromium: Technical Appendix
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian, ...
2015
Analyzing the dangers posed by Chrome Extensions.(2014)
L BAUER, S CAI, L JIA, T PASSARO, Y TIAN
Proceedings of IEEE Conference on Communications and Network Security, San …, 2014
2014
Flexible and Secure Secret Updating for Unidirectional Key Distribution in Rfid-Enabled Supply Chains
S Cai, T Li, C Ma, Y LI, RH DENG
2009
Analysis and Improvements of a Secure E-Tender Submission
S CAI, Y LI, Y ZHAO, Y ZHAO
2008
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.(2009)
S CAI, T LI, Y LI, RH DENG
Information Security and Trust: 5th International Conference, ISPEC 2009 Xi …, 0
Balancing Security with Efficiency in RFID-Tagged Supply Chains
S Cai, T Li, Y Li, RH Deng
The system can't perform the operation now. Try again later.
Articles 1–17