Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public-key cryptography
biblio
Privacy Preserving Localization Using a Distributed Particle Filtering Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Protocols
spectrum sensing information
signal detection
sensors
sensing network
semihonest adversary model
Scalability
Resiliency
resilience
radio transmitters
public-key cryptography
public key cryptography
Public key
pubcrawl
Adversary Models
privacy preserving localization
privacy
Particle measurements
particle filtering (numerical methods)
multiple sensing radios
Metrics
Human behavior
distributed particle filtering protocol
cooperative communication
cognitive radios systems
cognitive radio
Atmospheric measurements
biblio
ID-Based Signcryption Scheme Using Extended Chaotic Maps
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
cryptosystems
security superiorities
Resiliency
public-key cryptography
public key cryptography
pubcrawl
Metrics
identity-based signcryption scheme
Identity-based signcryption
ID-based signcryption scheme
extended chaotic maps
encryption
ECM-IBSC scheme
Algorithm design and analysis
Computation efficiency
computation efficiencies
composability
Chebyshev approximation
chaotic public-key cryptography
Chaotic maps
chaotic cryptography
chaotic communication
chaos-based discrete logarithm problem
chaos
CDL problem
biblio
Delegation-based authentication and authorization for the IP-based Internet of Things
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
IP security protocols
Servers
Random access memory
public-key cryptography
public key cryptography
Protocols
peer authentication
memory-constrained devices
key agreement purposes
IP-based Internet of Things
authorization functionality
IP networks
Internet of Things
DTLS protocol
DTLS connection
delegation-based authentication
delegation server
Cryptographic Protocols
Context
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 11:53am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Wed, 04/29/2015 - 10:47am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
« first
‹ previous
1
2