Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 9:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme
biblio
Preserving the Anonymity in MobilityFirst networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:55am
mobile computing
user anonymity
Trusted Computing
trust issues
three-tiered approach
telecommunication security
telecommunication network routing
Routing protocols
Routing
routers
Public key
privacy preservation
privacy
MobilityFirst networks
AMF
MF networks
internet
GUID
GNRS
globally unique flat identifier
global name resolution service
future Internet architecture
data privacy
computer science
authorisation
anonymity preservation
anonymity in MobilityFirst
biblio
Enabling efficient access control with dynamic policy updating for big data in the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 8:23am
abe
Access Control
access policy
attribute-based encryption
authorisation
Big Data
cloud
Cloud Computing
Cryptography
dynamic policy updating
encryption
end-to-end security
outsourced policy updating method
Policy Updating
Public key
Servers
biblio
A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
Submitted by BrandonB on Tue, 05/05/2015 - 8:03am
password guessing attack
wireless mesh networks
wireless mesh network
synchronisation
storing key
Servers
random numbers
public key encryption
public key cryptography
Public key
Protocols
authentication
malicious software
Kerberos protocol
improved Kerberos protocol
identity authentication scheme
identity authentication
Cryptographic Protocols
clock synchronization
authorization
authentication protocol
biblio
A Spoofing Attack against a Cancelable Biometric Authentication Scheme
Submitted by BrandonB on Tue, 05/05/2015 - 7:48am
homomorphic encryption algorithms
Vectors
unexpected vector
spoofing attack
Servers
replay attack
registered biometric information
Public key
privileged entity
network services
list attack
IrisCode
ID-password-based authentication
analogue biometric information
feature vector
encryption
decryption key
Cryptography
competitive code
cancelable biometric authentication scheme
biometrics (access control)
biometric information
binary coding
authorisation
authentication
biblio
C-BAS: Certificate-Based AAA for SDN Experimental Facilities
Submitted by BrandonB on Mon, 05/04/2015 - 1:50pm
Aggregates
authentication
authentication authorization and accounting management mechanisms
authorisation
authorization
C-BAS
certificate-based AAA architecture
computer architecture
computer network management
Databases
patchy AAA infrastructure
Public key
robust AAA infrastructure
SDN experimentation facilities
Servers
software defined networking
biblio
Towards Secure and Dependable Authentication and Authorization Infrastructures
Submitted by BrandonB on Mon, 05/04/2015 - 1:47pm
intrusion-tolerant replication
untrusted gateways
trusted components
software fault tolerance
Servers
security
resilience architecture
RADIUS
Public key
Protocols
OpenID
Logic gates
IT infrastructures
authentication
intrusion tolerance
fault-free executions
enterprise environments
diverse computing environments
dependability
authorization infrastructures
authorisation
authentication security
authentication infrastructures
authentication dependability
authentication and authorization services
biblio
Signal fingerprinting in cognitive wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:48am
malicious attacks
wireless mesh networks
Wireless communication
wireless
telecommunication signalling
telecommunication security
spread spectrum communication
Signal to noise ratio
signal fingerprinting
security
RFF
public key cryptography
Public key
Protocols
active radiofrequency fingerprinting
Fingerprinting
DoS
denial-of-service attacks
Demodulation
Cryptographic Protocols
CRM
common-control-channel information
cognitive wireless networks
cognitive radio manager framework
cognitive radio
Cognitive
Amplitude shift keying
biblio
Public Physical Unclonable Functions
Submitted by BrandonB on Thu, 04/30/2015 - 1:23pm
physical unclonable function (PUF)
trusted information flows
time gap
simulation possible
secret-key technology
second PPUF generation
representative PPUF architectures
public PUF (PPUF)
public PUF
public protocols
public physical unclonable functions
Public key
Protocols
process variation
private key cryptography
analog domain
one-time hardware pads
Logic gates
laborious systems
Integrated circuit modeling
integrated circuit
Hardware Security
Hardware
direct execution
digital PPUF
device aging
Cryptography
Cryptographic Protocols
crucial PUF limitation
biblio
Secure distributed data structures for peer-to-peer-based social networks
Submitted by BrandonB on Thu, 04/30/2015 - 1:22pm
online social network
trees (mathematics)
social networking (online)
Social network services
social enterprise network
secure distributed data structure
Public key
prefix trees
peer-to-peer technology
peer-to-peer networks
Peer-to-peer computing
Access Control
network security
global scale
file organisation
Distributed social networks
distributed list data structure
distributed hash table
distributed data management
data structures
authorisation
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »