Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Secure DSR Routing from Malicious Node by PGP Encryption
Submitted by grigby1 on Thu, 10/29/2020 - 10:59am
Routing protocols
pubcrawl
Public key
resilience
Resiliency
Route cache
route reply control messages
route request
Routing
PGP
RREP
RREP control message
RREQ
RREQ control message
secure DSR Routing
telecommunication security
UIV
weather RREP
malicious node
Cryptography
data transmission source
demand wireless communication
destination source
Dsr
dynamic source routing
encryption
intermediate node
Compositionality
MANET
manet privacy
MANET reactive routing protocol
Metrics
mobile ad hoc network
mobile ad hoc networks
neighbor nodes
Peer-to-peer computing
biblio
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Submitted by grigby1 on Thu, 10/29/2020 - 10:57am
Public key
wireless technology
trust value
time analysis
threshold cryptography
telecommunication security
space analysis
Servers
robust cryptography scheme
Resiliency
resilience
Receivers
public string based threshold cryptography
public key cryptography
ad hoc network
pubcrawl
PSTC
mobile ad hoc networks
mobile ad hoc network
Metrics
message privacy
manet privacy
MANET
denial-of-service attack
denial of service
default threshold value
data privacy
Compositionality
biblio
A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 10:56am
ring signature
Computing Theory and Privacy
wearable smart sensing devices
user identifier
stealth address
smart sensing area
smart sensing
privacy-user-friendly scheme
personal data privacy
Intelligent sensors
blockchain based scheme
wearable computers
user experience
Scalability
privacy protection
sensors
human computer interaction
Public key
service providers
blockchain
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
biblio
Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE)
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
Public key
Computing Theory and Privacy
Proxy Re Encryption
nonnegligible privacy issues
medical documents
identity based encryption
Health Information Systems
fuzzy conditional identity-based proxy re-encryption
FCI-PRE
electronic medical records
data-intensive domain
cloud-based health information system
healthcare providers
health care
Cloud Computing
fuzzy set theory
privacy
pubcrawl
Human behavior
Resiliency
Medical services
electronic health records
data privacy
Access Control
encryption
Cryptography
Scalability
biblio
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain
Submitted by aekwall on Mon, 09/21/2020 - 2:50pm
market value
cars
adversarial modifications
Decentralized Metering
DeMetrA - decentralized metering
Distributed Database
DSLRs
identity-based cryptography
identity-based signatures
layered encoding
cyber physical systems
odometer fraud
odometers
practical concern
product attributes
pseudonym
reported values
shutter counters
specific counters
Control Theory and Privacy
privacy
Scalability
Cryptography
data privacy
History
Protocols
malicious modification
Resiliency
Human behavior
pubcrawl
automobiles
blockchain
Distributed databases
cyber-physical systems
digital signatures
Public key
blockchain technology
user anonymity
Europe
biblio
Dynamic asymmetric group key agreement protocol with traitor traceability
Submitted by grigby1 on Fri, 09/04/2020 - 3:17pm
forward secrecy
black box encryption
setup algorithm
public traitor traceability
Public key
protocol resists collusion attack
pairwise different decryption key computation
one-round dynamic authenticated ASGKA protoco
leave algorithm
key compromise impersonation resilience
KCIR
join algorithm
IND-CPA security
Cryptographic Protocols
Eurocrypt 2009
dynamic authenticated ASGKA protocol
dynamic asymmetric group key agreement protocol
D k-HDHE assumption
common encryption key
black-box tracing algorithm
asymmetric group key agreement protocols
resilience
Resiliency
Metrics
composability
pubcrawl
biblio
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
Submitted by grigby1 on Thu, 08/13/2020 - 4:22pm
revocation overhead
privacy
privacy-preserving authentication
private key cryptography
pseudonymous certificates
pseudonyms
pubcrawl
Public key
resilience
Resiliency
n) threshold secret sharing
Roads
Scalability
secret sharing
Shamir (t
telecommunication security
VANET
vehicular ad hoc networks
vehicular communications
DCS schemes
anonymous messaging
authentication
authentication overhead
authorisation
backward security
certificate revocation list
certificate updating overhead
CPPT
data privacy
anonymous communications
ECPP scheme
EMAP scheme
forward security
framed attacks
hash chain
hash chains
hybrid scheme
message authentication
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
Asymmetric Encryption
securing multiparty communication
MultiRSA
multiple recipients
Multi-recipient Encryption
lightweight scalable multirecipient asymmetric cryptographic scheme
lightweight AMOUN
high computational cost
group membership changes
dynamic networks
chosen plaintext attack
Chinese remainder theorem
Cathode ray tubes
asymmetric cryptography
communication overhead
encryption
network resources
symmetric cryptography
Compositionality
Security analysis
public key cryptography
Public key
Metrics
privacy
pubcrawl
Human behavior
Resiliency
decryption
Computational efficiency
biblio
Research on Point-To-Point Encryption Method of Power System Communication Data Based on Block Chain Technology
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
asymmetric key encryption
transfer key
public key distribution scheme
power system communication data
point-to-point encryption method
point-to-point encryption
encryption identifier
Design Method
data block
communication data point
communication data encryption methods
communication data content
communication data
block chain technology
encryption
Asymmetric Encryption
Compositionality
power systems
power system stability
blockchain technology
public key cryptography
Public key
Distributed databases
Metrics
pubcrawl
Human behavior
Resiliency
Receivers
biblio
Mobile Ad Hoc Network for Security Enhancement
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
MANET
telecommunication security
security enhancement
Secure Hashing Algorithm
Routing protocols
Resiliency
reactive method
Public key
proactive method
private key
mobile ad hoc networks
mobile ad hoc network
Metrics
Message Digest 5
pubcrawl
identification process
hackers node
game theory
game theoretical approach
encryption
decryption processes
Cryptography
Compositionality
AODV
advanced encryption standard
ad hoc on-demand distance vector routing protocol
Ad Hoc Network Security
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »