Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
A Creation Cryptographic Protocol for the Division of Mutual Authentication and Session Key
Submitted by grigby1 on Tue, 07/12/2022 - 3:23pm
Cryptographic Protocols
authentication and session key
policy governance
cryptology
Algorithm
Asymmetric
Communications technology
information science
standards
Compositionality
Cryptography
Metrics
composability
authentication
Safety
Resiliency
resilience
pubcrawl
Monitoring
collaboration
biblio
The Difference Between Trust Measurement and Behavior: Investigating the Effect of Personalizing a Robot's Appearance on Trust in HRI
Submitted by grigby1 on Thu, 06/09/2022 - 2:57pm
pubcrawl
Human behavior
robots
standards
Games
Atmospheric measurements
Particle measurements
human trust
biblio
Arithmetic Circuit Homomorphic Encryption Key Pairing Comparisons and Analysis between Elliptic Curve Diffie Hellman and Supersingular Isogeny Diffie Hellman
Submitted by grigby1 on Thu, 06/09/2022 - 2:41pm
Metrics
supersingular isogeny key exchange
Dragonfly Key Exchange
arithmetic circuit
Human Factors
Asia
Central Processing Unit
Homomorphic encryption
Elliptic curves
pubcrawl
quantum computing
Computers
standards
authentication
Scalability
advanced encryption standard
Resiliency
resilience
biblio
Digital Forensics and Incident Response (DFIR) Challenges in IoT Platforms
Submitted by grigby1 on Mon, 06/06/2022 - 12:14pm
Scalability
DFIR
Resiliency
best practices
Task Analysis
Metrics
computer security
standards
IoT security
Internet of Things
Hardware
resilience
Human behavior
pubcrawl
IoT
Incident Response
Digital Forensics
biblio
Comparison of ECC and RSA Algorithm with DNA Encoding for IoT Security
Submitted by grigby1 on Fri, 05/06/2022 - 10:32am
encoding
DNA Sequencing
Pragmatics
DNA cryptography
RSA
DNA
ECC
resilience
Elliptic curve cryptography
Metrics
encryption
standards
Cryptography
privacy
Safety
Resiliency
Human behavior
pubcrawl
IoT
biblio
A Power Grid Planning Method Considering Dynamic Limit of Renewable Energy Security Constraints
Submitted by grigby1 on Thu, 05/05/2022 - 2:12pm
power system planning
system integration
standards
security
Resiliency
resilience
renewable energy sources
renewable energy
pubcrawl
composability
Power system dynamics
power grids
N-1 security
Metrics
Dynamical Systems
dynamic systems
dynamic reduction
distribution networks
biblio
A Novel Model for Cybersecurity Economics and Analysis
Submitted by grigby1 on Thu, 04/21/2022 - 3:09pm
advanced cyber threats
Analytical models
cognition
computer security
cyber fraud
cyber secure
Cybersecurity
cybersecurity cost-benefit
cybersecurity cost-benefit model
cybersecurity economics
cybersecurity impact
Economics
Measurement
standards
biblio
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
Submitted by grigby1 on Tue, 04/19/2022 - 4:42pm
Ciphertext Policy ABE
Communication channels
Computational modeling
Costs
CP-ABE
encryption
information security
Internet of Things
outsourced decryption
outsourcing
Pairing-Free
policy-based governance
pubcrawl
revocation
Scalability
standards
biblio
Covert Identification Over Binary-Input Discrete Memoryless Channels
Submitted by grigby1 on Tue, 04/19/2022 - 3:14pm
Noise measurement
standards
security
Scalability
Resiliency
resilience
reliability theory
Receivers
pubcrawl
channel resolvability
memoryless systems
identification via channels
Government
covert communication
covert channels
Compositionality
composability
biblio
Identity Authentication Based on Domestic Commercial Cryptography with Blockchain in the Heterogeneous Alliance Network
Submitted by aekwall on Tue, 04/19/2022 - 11:17am
Cryptography
blockchain
authentication
encryption
Resiliency
composability
standards
component
Cryptographic Protocols
pubcrawl
Domestic commercial cryptography
Heterogeneous alliance network
identity authentication
zero knowledge proof
Cross Layer Security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »