Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
Scalability
Internet of Things
message authentication
mobile radio
privacy
pubcrawl
Public key
resilience
Resiliency
identity-based broadcast signcryption
telecommunication control
ubiquitous computing
ubiquitous healthcare system
WBAN
Wireless body area networks
Wireless communication
Wireless communications
context-aware access control
adaptive access control scheme
adaptive contextual privacy
anonymous authentication approach
anonymous messaging
authentication
authorisation
body area networks
ciphertext authenticity
Access Control
context-aware authorization
context-aware privacy
Cryptography
data privacy
health care
healthcare services
hybrid certificateless signcryption
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
biblio
A New Key Exchange Algorithm over a VLC Indoor Channel
Submitted by grigby1 on Mon, 11/19/2018 - 11:34am
Neural Synchronization
VLC indoor channel
VLC
Visible Light Communications Security
visible light communication indoor channel
tree parity machine synchronization
Synchronization
synchronisation
stimulus vector
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
neuronal synchronization
average synchronization time t_sync
Metrics
key exchange algorithm
indoor communication
hyperelliptic curves
GF(2n)
Galois fields
Galois field
free-space optical communication
Diffie-Hellman protocol
DH-HEMTs
cryptosystem security
Cryptography
Cryptographic Protocols
Biological neural networks
biblio
Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing
Submitted by grigby1 on Wed, 11/14/2018 - 12:13pm
privacy enhancing mechanisms
Weaving
use case scenario
telecommunication security
Somewhat Homomorphic Encryption
Software Acceleration
SHE parameters
Semiautonomic cloud auditing architecture
Security Audits
Resiliency
resilience
relevant crypto parameters
public key version
Public key
pubcrawl
auditing
privacy enhancing approach
privacy
predominant cloud auditing use cases
Metrics
homomorphic encryption scheme
generic algorithm
encryption audits
encryption
encoding
data privacy
Cryptography
Compositionality
Cloud Computing
Cloud Auditing
biblio
An Efficient CPA-Secure Encryption Scheme with Equality Test
Submitted by grigby1 on Fri, 09/28/2018 - 3:20pm
multiplicative homomorphism
zero knowledge proof
Resiliency
resilience
public key solutions
public key cryptography
Public key
pubcrawl
Protocols
Probabilistic logic
OW-CPA security
outsourcing
noninteractive zero knowledge proof of discrete log
comparable ciphertext
message encryption
IND-CPA security
Homomorphic encryption
equality test token
encryption scheme with equality test
encryption
ElGamal encryption
efficient encryption
efficient CPA-secure encryption scheme
data outsourcing scenario
cyber physical systems
composability
biblio
Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure
Submitted by grigby1 on Fri, 09/28/2018 - 2:12pm
Public key
XMSS algorithm implementation
XMSS algorithm
Ukrainian hash function national standard
Telecommunications
system analysis and design
SPHINCS algorithm
Scalability
resilience
Quantum-safe digital signatures
public key infrastructure
public key cryptography
computer science
pubcrawl
post quantum hash based digital signatures
post quantum cryptography
perspective digital signatures algorithms
Merkle algorithm
Leighton-Micali algorithm
hash functions analysis
Hash based digital signatures
digital signatures
cybernetics
biblio
Data management and searching system and method to provide increased security for IoT platform
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
Peer-to-peer computing
telecommunication security
simulation
signature
Servers
Security Properties
searching system
Scalability
Resiliency
resilience
Public key
pubcrawl
Proof-of-work
Ports (Computers)
blockchain
Named Data Network Security
IP networks
Internet of Things
Human behavior
Hash Function
file organisation
digital signatures
Databases
data management system
data management
data integrity
Cryptography
biblio
CCSP: A compressed certificate status protocol
Submitted by grigby1 on Thu, 06/07/2018 - 2:15pm
Online Certificate Status Protocol servers
Web servers
Web browser
timestamped certificates
SSL Trust Models
sophisticated cyber-attackers
signed certificates
Scalability
Resiliency
resilience
Receivers
public key cryptography
Public key
pubcrawl
Protocols
Browsers
OCSP-based methods
OCSP servers
Metrics
internet
Human behavior
Conferences
computer network security
compressed certificate status protocol
certification
Certificate Revocation Lists
certificate revocation checks
certificate authorities
CCSP
CAS
biblio
CAre: Certificate Authority Rescue Engine for Proactive Security
Submitted by grigby1 on Thu, 06/07/2018 - 2:14pm
online front-ends
Web site security
Web servers
web security
SSL Trust Models
SSL technology
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
pubcrawl
proactive security
Browsers
Metrics
internet
Human behavior
encryption
digital signatures
Data Security
Cryptography
certification
Certificate Authority Rescue Engine
certificate authority
certificate authorities
centralized system
CAre
biblio
On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 3:08pm
power engineering computing
smart power grids
smart meters
smart metering data privacy
Smart Grids
Smart Grid Privacy
smart grid consumer privacy
Scyther tool
Public key
pubcrawl
privacy preservation
privacy
power system security
authentication
NS-3 simulator
metering data anonymization
Human Factors
high frequency metering data
distributed communication
distributed anonymization methods
data privacy
consumer privacy
collaborative anonymity set formation method
collaboration
CASF method
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »