Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Key Management for Cloud Data Storage: Methods and Comparisons
Submitted by BrandonB on Wed, 05/06/2015 - 12:40pm
Memory
symmetric key cryptography algorithms
symmetric key
storage management
Servers
sensitive information protection
Public key
public cloud
potential intruders
outsourced cloud
Organizations
onsite cloud
applications
key management
encryption key management
decryption key management
Data Security
Cryptography
Communities
cloud service provider
cloud scenarios
cloud data storage
cloud computing paradigm
Cloud Computing
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply
biblio
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications
Submitted by BrandonB on Wed, 05/06/2015 - 12:35pm
Protocols
Synthetic aperture sonar
smart power grids
smart meter (SM)
smart grid communications
smart grid (SG)
Servers
security
secure remote password protocol
secure remote password (SRP)
public-private key pairs
public key infrastructure
public key cryptography
Public key
authentication
mutual authentication
management overhead
key management protocol
key management
key generator entity
initial password
identity-based cryptography
home networks
home area network
Enhanced identity-based cryptography (EIBC)
Cryptographic Protocols
authorisation
authentication server
biblio
Secure Routing with an Integrated Localized Key Management Protocol in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 12:33pm
mobile ad hoc network (MANET)
Secure Routing
routing security
Routing protocols
Routing Protocol
Routing
public key cryptography
Public key
neighbor based handshaking and least common multiple
mobile computing
mobile ad hoc networks
Ad hoc networks
mobile ad hoc network
MANET
key management protocol
key management
Intrusion Detection System (IDS)
intrusion detection system
integrated localized key management protocol
Cryptographic Protocols
broadcast key distribution mechanism
authentication
biblio
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 12:21pm
Ad hoc networks
authentication
Cryptography
identity based cryptography
informal analysis
key management
mobile ad hoc networks
Proposals
Public key
security
self-organization
self-organized key management
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
On the security of a certificateless signcryption scheme
Submitted by BrandonB on Wed, 05/06/2015 - 10:02am
encryption
Security analysis
Receivers
public key encryption
public key cryptography
Public key
key replacement attack
IND-CCA2 security
group theory
Games
certificateless signcryption scheme
discrete logarithm problem
Digital Signcryption
digital signatures
digital signature
Diffie-Hellman problem
Cryptography
cryptographic primitive
concrete attack approach
Computers
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »