Back to Results
First PageMeta Content
Technology / Radio-frequency identification / Ubiquitous computing / Stream ciphers / Computer memory / Wireless identification and sensing platform / Impinj / Computer data storage / Card reader / Automatic identification and data capture / Computing / Cryptography


CCCP: Secure Remote Storage for Computational RFIDs∗ Mastooreh Salajegheh1 Shane Clark1 Benjamin Ransford1 Kevin Fu1 Ari Juels2 1 Department of Computer Science, University of Massachusetts Amherst 2 RSA Laboratories,
Add to Reading List

Document Date: 2012-12-06 13:30:53


Open Document

File Size: 209,19 KB

Share Result on Facebook

Company

CRFIDs / MAC Key / CCCP / Intel / Mote (Hydrowatch) Radio / EMC / Massachusetts Amherst 2 RSA Laboratories / /

/

Event

FDA Phase / Company Expansion / /

Facility

University of Massachusetts Amherst / /

IndustryTerm

tight real-time constraints / scant and fleeting energy / energy intensive / random device / energy limitations / energy availability scenarios / higher-powered wireless / brute-force search / energy-saving remote storage system / reader infrastructure / programmable devices / communication protocol / abundant energy / energy use / subsequent energy lifecycle / energy supply / possible applications / pose energy challenges / radio protocol / energy savings / per-checkpoint energy consumption / untrustworthy infrastructure / energy / wasted energy / prototype device / energy consumption / energy-intensive erasures / carrier signal / harvested energy / communication hardware / energy requirements / secure remote storage protocol / minimal energy / energy harvesting circuitry / sufficient energy / less energy / standalone devices / energy harvesting / insufficient energy / energy lifecycles / magnitude more energy / secure and energy-efficient manner / harvestable energy / low-energy computing systems / energy constraints / constant energy shortfalls / nonstandard reader hardware / symmetrickey challenge-response protocols / energy advantage / energy availability / particular energy delivery schedule / excess energy / energy storage / energy lifecycle / less energy-intensive radio communication / energy cost / energy measurements / external infrastructure / untrusted reader infrastructure / appropriate carrier signal / radio communications / steady energy supply / energy-hungry resource / Wireless Identification / /

OperatingSystem

Linux / DoS / /

Organization

Security Division of EMC / University of Massachusetts Amherst / Computational Continuation Passing / EPC / Department of Computer Science / CCCP’s MAC / /

Person

Auth / /

/

Position

application designer / application programmer / /

Product

CCCP / /

ProgrammingLanguage

DC / C / /

ProvinceOrState

New Hampshire / /

RadioStation

Radio 12.79 / Radio 61.18 / /

Technology

RAM / Linux / block cipher / 9 Algorithm / encryption / radio protocol / secure remote storage protocol / existing RFID protocol / Communication Protocol / RFID protocols / 2 RFID protocol / underlying protocol / flash / 2 protocol / nonvolatile memory / flash memory / symmetrickey challenge-response protocols / nonvolatile memory Symmetric encryption / stream cipher / /

SocialTag