Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
IoT device authentication scheme
Servers
security perspective
Resiliency
resilience
replay attack mitigation
pubcrawl
performance evaluation
multifactor authentication scheme
multifactor authentication
Metrics
man-in-the-middle attack mitigation
IoT device security
IoT device privacy
authentication
Internet-of-Things device authentication
Internet of Things
Human Factors
Human behavior
digital signatures
device capability
device authentication
data privacy
Cryptography
computer network security
authentication server
authentication mechanism
biblio
An Identity Privacy Protection Strategy in Vehicle Named Data Network
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
malicious nodes
vehicular ad hoc networks
vehicle opportunity network
vehicle named data network
Security analysis
Scalability
ring signature scheme
Resiliency
resilience
pubcrawl
privacy protection
privacy problems
ONE-based VNDN platform
Named Data Network Security
anonymity
internet
interest packages
Identity Security
identity privacy protection strategy
identity information
Human behavior
digital signatures
data requester
data provider
data privacy
data packets
data names
computer network security
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures
biblio
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Open Source Software
Security by Default
simple signature-based detection
self-revealing honeypots
mail server
Internet-wide view
hosting networks
government incentive
FTP mirror
default open-source honeypots
cloud network
Censys scan data
attack monitoring
computer network security
IoT device
digital signatures
Market research
tools
internet
Statistics
Sociology
pubcrawl
Resiliency
security
Servers
Scalability
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Authenticated Network Coding for Software-Defined Named Data Networking
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Switches
Software-Defined named Data Networking
MIP problem
Internet architecture
homomorphic signature scheme
cooperative network coding mechanism
authenticated network coding
cyber physical systems
cache storage
network coding
Homomorphic encryption
encoding
Predictive Metrics
security of data
named data networking
cooperative communication
digital signatures
internet
optimization
Routing
composability
pubcrawl
Resiliency
software defined networking
security
biblio
Lightweight Searchable Encryption Scheme Based on Certificateless Cryptosystem
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
keyword encryption
resilience
Resiliency
composability
pubcrawl
third-party manager
secret value
searchable encryption technology
searchable encryption schemes
searchable encryption
public key cryptography
partial private key
multiuser ciphertext retrieval
lightweight searchable encryption scheme
Lightweight
Cryptography
key escrow problem
identity-based cryptosystem
file index
digital signatures
data owner stores
cloud storage environments
cloud server
ciphertext data
certificateless encryption schemes
certificateless cryptosystem
certificate management problem
cloud storage
private key cryptography
cloud data
biblio
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:40am
Scalability
middleware
Network reconnaissance
open systems
Peer-to-peer computing
permission attestation
Predictive Metrics
Protocols
pubcrawl
realtime peer-to-peer protocol
Resiliency
leaked context
scalable middleware
scalable verification
secure DDS systems
Secure DDS v
security
Security by Default
security model
Service Plugin Interface architecture
vulnerability excavation
default plugin specifications
authenticated encryption
authorisation
capability lists
Compositionality
crypto handshake
Cryptography
data bus
data centric access control
Data Distribution Service
attacker model
digital signatures
distributed networked systems
electronic data interchange
formal verification
Industrial IoT
initial ratification
internet
interoperable data exchange
IoT protocol
biblio
On the Impossibility of Approximation-Resilient Circuit Locking
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
IC
signature based defense
security guarantees
Scalability
Resiliency
resilience
relaxed notion
pubcrawl
original circuit
microscopy
malicious foundry
long-standing hardness assumptions
logic locking
learning (artificial intelligence)
Integrated circuit modeling
Integrated Circuit Camouflaging
Adversary Models
Foundries
formally defined notions
formal approach
exponentially approximation-resilient
exact-recovery-resiliency
digital signatures
Cryptography
Computational modeling
cL
Boolean functions
boolean circuits
benchmark circuits
approximation-resilient Circuit locking
approximation-resiliency
algorithmic attacks
biblio
A Hybrid Alarm Management Strategy in Signature-Based Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/12/2020 - 12:01pm
hybrid alarm management strategy
Vulnerability Analysis
similarity-based correlation
signature-based intrusion detection systems
Signature-based IDS
sensors
Scalability
Resiliency
resilience
Prelude SIEM
Minimization
Measurement
IP networks
intrusion detection system
Intrusion Detection
signature based defense
HP Arsight priority formula
false alarm reduction
false alarm minimization
event normalizer
dynamic network context information
digital signatures
Databases
cybersecurity defense strategy
Correlation
Alarm systems
alarm prioritization
alarm correlation techniques
pubcrawl
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »