Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 11:02am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
On the security of a certificateless signcryption scheme
Submitted by BrandonB on Wed, 05/06/2015 - 11:02am
encryption
Security analysis
Receivers
public key encryption
public key cryptography
Public key
key replacement attack
IND-CCA2 security
group theory
Games
certificateless signcryption scheme
discrete logarithm problem
Digital Signcryption
digital signatures
digital signature
Diffie-Hellman problem
Cryptography
cryptographic primitive
concrete attack approach
Computers
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism
biblio
Automated Test Generation from Vulnerability Signatures
Submitted by BrandonB on Tue, 05/05/2015 - 10:54am
insecure Web applications
web services
vulnerability signatures
validation and sanitization
transition
testing
string analysis
static string analysis undecidability
state
security
scripting languages
program testing
program diagnostics
path coverage
Algorithm design and analysis
HTML
digital signatures
Databases
automatic vulnerability signature computation
automated test case generation
automata-based test generation
automata-based static string analysis techniques
automata theory
automata
authoring languages
attack string discovery
Approximation methods
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 10:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:52pm
Geo-Detection
Virtualization
virtualisation
user authentication
security
secure access
Second Verification
Reliability
internet
authentication
geo detection
GD2SA
digital signatures
digital signature authorization
Computational modeling
Cloud Computing
authorization
authorisation
biblio
Multiple Secret Key Sharing Based on the Network Coding Technique for an Open Cloud DRM Service Provider
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
encryption
symmetric-key encryption
symmetric encryption
Servers
secure network coding technique
secret sharing
open cloud DRM service provider
Open Cloud
network coding
multiple secret key sharing
Licenses
key management
key fission engine
Engines
Android SDK
encrypted digital content
Electronic publishing
e-Book readers
e-Book market
digital signatures
digital signature
Digital rights management
digital content copyright
Cryptography
copyright
cloud storage
Cloud Computing
biblio
Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:42am
radio aware optimized link state routing
WMN
wireless mesh networks
topology control
telecommunication network topology
telecommunication control
security mechanisms
security
Routing protocols
Routing Protocol
Routing
Cryptography
network simulator-3 simulations
IEEE 802.11 Standards
identity based encryption
IBE-RAOLSR protocols
IBE
hello messages
elliptic curve digital signature algorithm
ECDSA-RAOLSR protocols
digital signatures
delays
biblio
Security analysis of two certificateless short signature schemes
Submitted by BrandonB on Fri, 05/01/2015 - 8:31am
certificate management problem
certificateless public key cryptography
certificateless short signature schemes
CL short signature schemes
CL-PKC
digital signatures
IBC
identity-based cryptography
key escrow problem
public key cryptography
Security analysis
user public keys
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »