Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
biblio
Prominence Of ECDSA Over RSA Digital Signature Algorithm
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
Human behavior
RSA Digital Signature Algorithm
RSA
Resiliency
resilience
Repudiation
public key cryptography
public key cryptographic algorithms
pubcrawl
non-repudiation
Metrics
composability
handwriting recognition
Elliptical Curve Digital Signature Algorithm
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDLP
ECC
digital signatures
cryptosystem
Conferences
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Security-Enhanced Signaling Scheme in Software Defined Optical Network
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
security level
pubcrawl
public key cryptography
public key infrastructure
resilience
Resiliency
SDON
security
security improvement
Protocols
security-enhanced signaling
security-enhanced signaling procedure
Software
software defined networking
Software Defined Networks
software defined optical network
telecommunication security
telecommunication signalling
internet
communication security issue
composability
connection success rate performance
Cryptographic Protocols
current OpenFIow protocol
digital signatures
end-to-end trusted service connection
Energy Internet services
backbone optical networks
large-scale optical network
message feedback
Metrics
Microelectronics Security
openflow protocols
Optical feedback
Optical fiber networks
optical switches
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
identity-based encryption schemes
Telecommunications
standards
smart meters
smart cards
Scalability
Resiliency
public key cryptography
pubcrawl
performance evaluation
pairing-based elliptic curve cryptography
Metrics
Bilinear Pairing
group signatures
embedded devices
Elliptic curves
Elliptic curve cryptography
digital signatures
Cryptography
Cryptographic Protocols
cryptographic libraries
Constrained Devices
bilinear pairing operation
biblio
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Submitted by aekwall on Mon, 04/29/2019 - 9:51am
bitcoin
bitcoin security
cryptpgraphy
digital signatures
Human behavior
multiparty computation
pubcrawl
Resiliency
Scalability
threshold signatures
biblio
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
Submitted by grigby1 on Fri, 04/05/2019 - 10:29am
Scalability
pubcrawl
QoS
QoS as a service paradigm
quality of service
Relays
reputation
resilience
Resiliency
probabilistic fake VIP attack strategy
Servers
signature detection cost
Stackelberg game
Stackelberg game setting
trust
trust strategy
two-dimensional Markov chains
best-response fake VIP attack strategy
Markov processes
intelligent fake VIP attacks
handwriting recognition
Games
game theory
Fake VIP attack
double-blind reputation scheme
digital signatures
demanded QoS level
demand undue QoS level
cloud-assisted interactions
Cloud Computing
client-server systems
client-server interactions
Chained Attacks
biblio
RSA Signatures Under Hardware Restrictions
Submitted by grigby1 on Thu, 02/14/2019 - 11:17am
digital signatures
Hardware Security
hardware security modules
Human Factors
Metrics
pubcrawl
RSA
Scalability
secure enclaves
Tamper resistance
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »