Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures
Submitted by grigby1 on Wed, 05/30/2018 - 4:02pm
collaboration
digital signatures
Human behavior
Human Factors
Metrics
policy-based governance
pubcrawl
public key encryption
related randomness attacks
resilience
Resiliency
RSA-OAEP
RSA-PSS
security weaknesses
weak randomness
biblio
Malsign: Threat Analysis of Signed and Implicitly Trusted Malicious Code
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
PKCS
trusted software providers
Trusted Computing
threat analysis
targeted attacks
signing keys
signed malware
signed code
Servers
Scalability
Resiliency
pubcrawl
private key cryptography
private key
PKI Trust Models
PKI
benign software
Metrics
malware
Malsign
malicious code signing
invasive software
implicitly trusted malicious code
Human Factors
Human behavior
genuine software
digital signatures
Computer crime
Companies
code signing infrastructure
code signing
Browsers
biblio
On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
certificateless
composability
Compositionality
cryptanalysis
digital signature
digital signatures
Metrics
provable security
pubcrawl
resilience
Resiliency
signer ambiguity
strong designated verifier
biblio
Digital signature using MAC address based AES-128 and SHA-2 256-bit
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
MAC address
word length 256 bit
telecommunication security
standards
SHA-2 256 bit
Seminars
secure hash algorithm
Resiliency
resilience
Repudiation
pubcrawl
Metrics
advanced encryption standard
human factor
Human behavior
encryption
digital signatures
digital signature
digital messaging
Cryptography
computer science
composability
AES-128
biblio
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
provable data possession
Metrics
non-repudiation
nonrepudiable PDP scheme
nonrepudiable provable data possession scheme
nonrepudiation issue
outsourced data
private auditability
private verifier
human factor
pubcrawl
Repudiation
resilience
Resiliency
security
Servers
storage management
associated tags
Human behavior
DV-PDP schemes
digital signatures
designated verifier
Data models
Data mining
data integrity
concrete DV-NRPDP scheme
Computational modeling
composability
cloud storage systems
cloud storage server
cloud storage
Cloud Computing
Cascading style sheets
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
biblio
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
lattice assumption
Wearable devices
sybil attacks
Resiliency
pubcrawl
patients health data
patient treatment
patient diagnosis
mobile healthcare networks analytics
mobile computing
MHN
Metrics
medical information systems
medical histories
ABS
identity privacy
health services
health care
fine-grained authentication scheme
Fiat-Shamir framework
disease treatment
disease diagnosis
digital signatures
data privacy
data analysis
composability
attribute-based signature
anonymous anti-sybil attack protocol
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
biblio
\#x003BC;DTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
resilience
Metrics
microcontrollers
payload size
Payloads
performance evaluation
Protocols
pubcrawl
public key cryptography
man-in-the-middle attacks
Resiliency
Routing
secp128r1
secp192r1
secp256r1
security layer
store-carry-forward principle
μDTNSec
digital signatures
Asymmetric Encryption
asymmetric signatures
bundle protocol specification
Compositionality
Contiki OS
Cryptographic Protocols
delay tolerant networks
delay-disruption-tolerant networks
advanced encryption standard
disruption-tolerant networks
Elliptic curve cryptography
encryption
energy measurement
energy measurements
energy-constrained devices
hardware-backed symmetric encryption
Human behavior
biblio
Artificial Neural Network Based IDS
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
nonmalicious communication
UDP flood attack
telecommunication traffic
SYN flood attack
standards
signature based NIDS
sensors
security of data
Resiliency
resilience
pubcrawl
Ports (Computers)
policy-based governance
anomaly based neural network intrusion detection system
NNIDS
nMap scanning attack
neural nets
network intrusion detection systems
Metrics
Intrusion Detection
digital signatures
Databases
Artificial Neural Networks
artificial neural network based IDS
anomaly based NIDS
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »