Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bismuth
biblio
Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks
Submitted by el_wehby on Fri, 05/25/2018 - 3:48pm
Mobile communication
wireless access network
Throughput
telecommunication traffic
SRA
source-destination pair
shared relay assignment
rounding mechanism
Relays
relay networks (telecommunication)
mobile system
mobile computing
Approximation algorithms
Max-Total Throughput
Max-Min Throughput
many-to-one traffic
M21 traffic
fairness
cooperative networks
cooperative communication
close-to-optimal performance
Bismuth
approximation theory
Approximation methods
1536086
biblio
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
message authentication
Yung-Cheng-Lee's protocol
verification table
user impersonation attack
smart cards
Smart card
session key
Servers
server impersonation attack
remote user authentication protocol
Protocols
password change phase
authentication
legitimacy verification
insider attacks
insecure channel
dynamic id
denial-of-service attack
Cryptography
Cryptographic Protocols
cryptanalysis
computer network security
Bismuth
biblio
Secure Deduplication with Efficient and Reliable Convergent Key Management
Submitted by BrandonB on Wed, 05/06/2015 - 1:37pm
private key cryptography
storage space reduction
storage management
Servers
security model
secure deduplication
reliable convergent key management
Reliability
ramp secret sharing scheme
public key cryptography
proof of ownership
baseline key management scheme
key management
encryption
Educational institutions
Dekey
Deduplication
data deduplication
convergent encryption
cloud storage
Cloud Computing
Bismuth
biblio
Remote Login Password Authentication Scheme Based on Cuboid Using Biometric
Submitted by BrandonB on Tue, 05/05/2015 - 8:49am
Cuboid
system security
smart cards
Smart card
Servers
remote login password authentication scheme
password
One way function
Fingerprint recognition
cuboid diagonal
3-D geometry
Computers
computational geometry
Bismuth
biometrics (access control)
biometric value
authorisation
authentication
3D environment
biblio
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust
Submitted by BrandonB on Thu, 04/30/2015 - 1:35pm
information flow security
Trusted Computing
trust state manipulation
Stuxnet attacks
Stuxnet
Software
security of data
security models
security
nondeducibility
multiple security domains nondeducibility
MSDND
Monitoring
modal model
modal frames
Analytical models
information flow disruption attacks
implicit trust
human operators
event system analysis
electronic monitors
doxastic logic
cyber-physical systems
cyber security
Cyber Physical System
CPS
Cost accounting
cognition
Bismuth
belief manipulation