Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
input addresses
signature based defense
Servers
Scalability
ring signature algorithm
ring signature
Resiliency
resilience
Public key
pubcrawl
Protocols
perceived anonymity property
output addresses
mixing service provider
mixing server
anonymity
financial data processing
electronic money
double-spending attack
digital signatures
decentralized digital currency
Cryptographic Protocols
complete transaction history
coin mixing service
coin mixing scheme
coin mixing
central authority
Bitcoin users
Bitcoin protocol
bitcoin
biblio
Securing Email for the Average Users via a New Architecture
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
Human Factors
Servers
Scalability
Resiliency
Public key
pubcrawl
privacy protection
privacy
PKI Trust Models
PKI
Metrics
internet
communication medium
Human behavior
encryption
email security
Email Protocols
email messages
email encryption
Electronic mail
data privacy
cyber security
Cryptography
consumer
biblio
Universally Composable RFID Mutual Authentication
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
security notion
public key update protocols
radiofrequency identification
readers corruptions
Resiliency
RFID Authentication
RFID mutual authentication protocols
RFID tags
Scalability
public key infrastructure
tags corruptions
trusted certificates
trusted cryptographic protocols
trusted third parties
universal composability
universally composable framework
zero-knowledge privacy model
adversary model
public key encryption
public key cryptography
Public key
pubcrawl
Protocols
privacy
PKI Trust Models
Metrics
message authentication code
Human Factors
Human behavior
Cryptographic Protocols
cryptographic protocol
authentication
arbitrary environment
biblio
Trust Structure in Public Key Infrastructures
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
pubcrawl
Trusted Computing
trust structure
styling
style
Servers
Semantics
security augmentation
Scalability
Resiliency
public key infrastructure
public key cryptography
Public key
authentication
privacy
PKI Trust Models
PKI
Metrics
intelligent algorithms
insert
Human Factors
Human behavior
generic PKI model
formatting
certification
biblio
PKI Mesh Trust Model Based on Trusted Computing
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
Metrics
Trusted Platform Module
Trusted Computing
trust model
Scalability
Robustness
Resiliency
public-key infrastructure
public key infrastructure
public key cryptography
Public key
pubcrawl
PKI Trust Models
PKI mesh trust model
authentication
Mesh networks
Human Factors
Human behavior
Electric breakdown
computer security
computer science
computational complexity
certification path processing
certification authorities
certification
certificate path processing
Bridges
biblio
Dynamic Ransomware Protection Using Deterministic Random Bit Generator
Submitted by grigby1 on Thu, 05/24/2018 - 12:16pm
protection
Scalability
Resiliency
resilience
Ransomware
random number generator
random number generation service
random number generation
random key generation
public key cryptography
Public key
pubcrawl
Communication networks
Metrics
malware
Human behavior
Generators
encryption key
encryption
dynamic ransomware protection method
deterministic random bit generator
CryptoVirus
crypto-API
computer viruses
biblio
Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
outsourcing data services
security shortage
security problems
Security Audits
Security analysis
Secure storage
secure cloud storage
Scalability
Resiliency
Public key
public integrity auditing
public auditing scheme
public auditing
pubcrawl
Privacy-preserving
Cloud Computing
outsourcing
Mathematical model
low computational audit cost
integrity
Human behavior
Forgery
dynamic-hash-table based public auditing
dynamic hash table
dynamic data
data structure DHT
data blocks
Cryptography
cryptanalysis
countermeasures
biblio
A Security Audit of the OpenPGP Format
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
public domain software
OpenPGP
OpenPGP format
OpenPGP format specification
OpenPGP implementations
pattern classification
PGP
Production
Protocols
pubcrawl
open source Unix systems
Public key
Resiliency
Scalability
security audit
Security Audits
security vulnerabilities
Symantec PGP
Unix
email confidentiality
authorisation
computer security
context-free grammars
context-free languages
deterministic context free grammar
deterministic context free language
Electronic mail
email authenticity
authenticated package distributions
Formal Specification
GNU Privacy Guard
GnuPG
Grammar
Human behavior
language theoretical analysis
Language-theoretic security
malicious input data
biblio
BigCrypt for Big Data Encryption
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
Pretty Good Privacy technique
zero tolerance security
symmetric key encryption
storage management
Software
Servers
RSA
Rijndael
Resiliency
resilience
Receivers
Public key
pubcrawl
probability
probabilistic approach
private information
Asymmetric Encryption
Metrics
Human behavior
Hadoop
Hacking
encryption
Data protection
Cryptography
Compositionality
cloud storage
Cloud Computing
BigCrypt
big data encryption
Big Data
asymmetric encryption technique
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »