欢迎来到三一办公! | 帮助中心 三一办公31ppt.com(应用文档模板下载平台)
三一办公
全部分类
  • 办公文档>
  • PPT模板>
  • 建筑/施工/环境>
  • 毕业设计>
  • 工程图纸>
  • 教育教学>
  • 素材源码>
  • 生活休闲>
  • 临时分类>
  • ImageVerifierCode 换一换
    首页 三一办公 > 资源分类 > PPT文档下载  

    RFID供应链分析资料 RFIDSec+Presentation.ppt

    • 资源ID:2974382       资源大小:2.98MB        全文页数:25页
    • 资源格式: PPT        下载积分:8金币
    快捷下载 游客一键下载
    会员登录下载
    三方登录下载: 微信开放平台登录 QQ登录  
    下载资源需要8金币
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    RFID供应链分析资料 RFIDSec+Presentation.ppt

    On Mitigating Covert Channels in RFID-Enabled Supply Chains,Kirti Chawla,Gabriel Robins,and Westley Weimerkirti,robins,weimercs.virginia.edu,School of Engineering and Applied ScienceDepartment of Computer ScienceUniversity of Virginia,CharlottesvilleVirginia,USAWeb:www.cs.virginia.edu,This work is supported by U.S.National Science Foundation(NSF)grant:CNS-0716635(PI:Gabriel Robins)For more details,visit:www.cs.virginia.edurobins,RFID Technology Overview,01/22,RFID Technology,Tag/TransponderReaderBackend System,FrequencyForm FactorType,AerospaceChip Timing Supply Chain,Motivating Example Supply Chains,02/22,Motivating Example Supply Chains,03/22,How?,Supply Chain Attacks Tag Tracking,04/22,Adversary Supply Chain,Supply Chain Attacks Tag Duplication,05/22,Supply Chain Attacks Tag Modification,06/22,Supply Chain Attacks Tag Modification,07/22,#,Supply Chain Attacks Reader Compromise,08/22,Evaluation I Implications(1),09/22,Pre-attack Scenario,Post-attack scenario,Brand Loyalty Switch,Evaluation I Implications(2),10/22,Brand Aversion,Pre-attack Scenario,Post-attack scenario,Mitigating Approach Model of Supply Chain,11/22,Supply Chain,Mitigating Approach Model of Supply Chain,12/22,Global Source,Global Sink,Phase Sink,Phase Source,C(Q,R)0,C(P,Q)=0,C2,C1,NMOF(A)=max(C1,C2),C:E+,Mitigating Approach Taint Checkpoints,13/22,Taint Checkpoint,Supply Chain Flow Graph:G=GUP GPP GDP,How?,Mitigating Approach Taint Check Cover,14/22,Polynomial Time ReductionVC P TCC,Taint Check Cover,Vertex Cover,NP-Complete,TCC NP,Mitigating Approach Heuristics(1),15/22,Use approximate algorithm of VC for TCC,Time complexity:O(V+E)Solution size:2OPT,Mitigating Approach Heuristics(2),16/22,Use cuts to partition graph,Algorithm dependent time-complexitySolution size:OPT to|V|,Mitigating Approach Heuristics(3),17/22,Use underlying business requirements,(1)TNR=|VT|V|,(2)CER=,TNR,CER+,|V|0,Algorithm dependent time-complexitySolution size:OPT to|V|,Mitigating Approach Local Verification Algorithm,18/22,Verifying flow locally at every taint checkpoints,Mitigating Approach Global Verification Algorithm,19/22,Verifying flow globally along a path or at central site,Core Data Structure,20/22,Layout of core data structure,Evaluation II Cost,21/22,Local verification time cost as a function of no.of taint checkpoints,Cost of solution,Local,and global(with constant and variable link cost)verification time cost as a function of no.of taint checkpoints,Countermeasures to Covert Channels,22/22,Suggested Countermeasures,Re-encryption,Pseudonyms,Direct mitigation,PUF,Passwords,Questions,Please write to:kirtics.virginia.edu Please visit:www.cs.virginia.edu/kc5dmCreative problem solving for fun and profit,Sneak Peek,WISP,Smart Environments for Assisted Living,Security and Privacy Concerns,

    注意事项

    本文(RFID供应链分析资料 RFIDSec+Presentation.ppt)为本站会员(文库蛋蛋多)主动上传,三一办公仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一办公(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    备案号:宁ICP备20000045号-2

    经营许可证:宁B2-20210002

    宁公网安备 64010402000987号

    三一办公
    收起
    展开