Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Random Seed Generation For IoT Key Generation and Key Management System Using Blockchain
Submitted by aekwall on Mon, 03/23/2020 - 1:19pm
Public key
random key generation
Seed
reverse engineering
Random Seed
Public Key Distribution
Out-of-Band
key
Hyperledger Fabric
Fabrics
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
Internet of Things
encryption
Scalability
biblio
An Approach for Sending a Confidential Message to the Restricted Users in Defence Based Organization
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
group key
Secure File Sharing
resilience
Resiliency
pubcrawl
user list
untrusted cloud storages
third-party applications
storage node
spammer
security problem
secure platform
profiling users
personal information
group member communication
Group Manager
Cryptography
file transfer
file sharing process
dynamic broadcasting encryption
defense-based organization
defense networks
defense network
defence based organization
decryption
confidential message
storage management
Organizations
Public key
Cloud Computing
Access Control
encryption
biblio
Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive Searching
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
index search
resilience
Resiliency
composability
pubcrawl
secret-sharing scheme
secret sharing
Secrecy Computation
Search methods
multiple keyword search
main searching functions
logical disjunctive
logical conjunctive
Cryptography
disjunctive searching
direct searching
conjunctive searching
computation cost
search problems
searchable encryption
Cloud Computing
Servers
query processing
Public key
Indexes
encryption
biblio
Traceability of Counterfeit Medicine Supply Chain through Blockchain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
pharmaceutical industry
Traceability
supply chains
supply chain security
supply chain management
Scalability
Safety
Resiliency
resilience
quick response code security
QR codes
Public key
pubcrawl
production engineering computing
active pharmaceutical ingredients
Organizations
medical supply chain
Human behavior
end-consumer patient harm
encrypted QR code security
drugs
drug safety
Distributed databases
Cryptography
counterfeit-drug
counterfeit medicine supply chain
counterfeit goods
blockchain
biblio
A Novel Sybil Attack Detection Mechanism for C-ITS
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
resilience
vehicular ad hoc networks
vehicles security
V2V communications
Traffic Safety
traffic model
traffic flow theory
sybil attacks
Sybil attack
SUMO traffic simulator
roads portion
Roads
road vehicles
road traffic
road safety
Resiliency
Accidents
Public key
pubcrawl
Protocols
NS3 network simulator
Metrics
Mathematical model
ITS
Intelligent Transportation Systems
driving experience
detection algorithm
cooperative intelligent transport systems
computer network security
Computational modeling
composability
C-ITS
biblio
True2F: Backdoor-Resistant Authentication Tokens
Submitted by aekwall on Mon, 03/02/2020 - 12:27pm
Browsers
two-party protocols
token faults
software compromise
second-factor authentication
privacy defenses
Phishing
embedded-systems
ECDSA signatures
cross-origin token-fingerprinting attacks
conventional authentication tokens
commodity hardware tokens
Backdoors
backdoor-resistant authentication tokens
two factor authentication
cryptographic keys
security
Human Factors
public key cryptography
Public key
digital signatures
authentication
privacy
web services
Computer crime
standards
pubcrawl
Protocols
Cryptographic Protocols
Hardware
data privacy
authorisation
biblio
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
integrated circuits
WebUSB
public personal identification service
multifactor web authentication system
Multi-factor authentication
Individual Number Card
cryptographic authenticator
multifactor authentication
Pins
Digital identity
Human Factors
Servers
Public key
password
authentication
Cybersecurity
Internet users
internet
Metrics
pubcrawl
Resiliency
Cryptography
biblio
A Residential Client-Side Perspective on SSL Certificates
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
shorter average chain length
public key infrastructure
residential client-side
resilience
Resiliency
root certificates
Scalability
secure web connection setup
Servers
public key cryptography
SSL certificate chains
SSL certificates
SSL Trust Models
telecommunication traffic
transport protocols
untrusted root certificate
valid certificates
2M residential client machines
Public key
pubcrawl
Protocols
operating systems
Metrics
invalid certificate chains
internet
Human Factors
Human behavior
Ecosystems
computer network security
certification
certificate characteristics
Browsers
35M unique certificate chains
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Submitted by grigby1 on Tue, 01/07/2020 - 10:55am
repeated encryption
multiuser searchable encryption scheme
outsourced encrypted data
outsourcing
PS
pubcrawl
Public key
query processing
query transformation
multiple owners
resilience
Resiliency
SE schemes
search operation
secure proxy server approach
Servers
user queries
cyber physical systems
attribute-based encryption
authorisation
Broadcast Encryption
Cloud Computing
cloud data
composability
Cryptography
Cyber Physical System
abe
data privacy
document handling
efficient encryption
encryption
Euclidean distance
existing SE approaches
Indexes
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »