Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
A New Homomorphic Message Authentication Code Scheme for Network Coding
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
Pollution
vector length
some what homomorphic encryption
security parameter
pollution attacks
packet decoding
network data flow
MAC length
known-plaintext attacks
homomorphic message authentication code
homomorphic MAC scheme
homomorphic mac
encryption
network coding
access protocols
encoding
composability
authentication
telecommunication security
message authentication
Resiliency
resilience
Metrics
pubcrawl
biblio
Fast Cross Layer Authentication Scheme for Dynamic Wireless Network
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
dynamic wireless communication
dynamic networks
upper layer authentication
upper layer assisted method
static communications
spoofing detection
PLA models
physical layer authentication mechanisms
physical layer authentication
performance stability
network environments
lightweight cross-layer authentication scheme
hypothesis test models
fast cross layer authentication scheme
dynamic wireless network
pubcrawl
dynamic communication scenarios
cross layer authentication
authentication delay
mobile radio
wireless channels
computational complexity
radio networks
composability
Cryptographic Protocols
telecommunication security
message authentication
Resiliency
resilience
Metrics
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
man-in-the-middle attack
Signing
sender identity
security
Scalability
Resiliency
public key cryptography
Public key
pubcrawl
private key cryptography
message integrity
message authentication
authentication
integrity
encryption
digital world
digital signatures
digital signature
digital era
cyber-attacks
Cryptography
cryptographic key pairs
confidentiality
Conferences
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:03pm
Servers
medical servers
Medical services
message authentication
Metrics
password
pubcrawl
remote monitoring
resilience
Resiliency
medical information systems
Smart card
smart cards
telecare medical information systems
telemedicine
three factor user authentication
Three-factor authentication
TMIS
user anonymity
user/server communication security
e-health systems
authentication
authorisation
AVISPA
biometrics
biometrics (access control)
biometrics based key agreement
composability
diseases
e-health
anonymity
ECG
file servers
formal security verification tool AVISPA
formal verification
health care
health systems
healthcare services
Human behavior
biblio
Conditional Anonymity enabled Blockchain-based Ad Dissemination in Vehicular Ad-hoc Network
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
resilience
Human behavior
in-vehicle service
internal attacker scenarios
malicious users
message authentication
Metrics
monitoring authority
privacy
pubcrawl
fake ads
Resiliency
vehicle-to-infrastructure communication
vehicle-to-vehicle communication
vehicular ad hoc networks
Vehicular Ad-hoc Network
vehicular network
zero-knowledge proof of knowledge
ZKPoK
certification authority
advertisement sharing
advertising
anonymity
authenticated users
behavioural privacy leakage
blockchain
blockchain-based ad dissemination
certificate-less cryptography
ad dissemination
composability
conditional anonymity
cryptocurrencies
Cryptography
data privacy
delays
Distributed databases
fair incentive mechanism
biblio
Authentication with Mildly Myopic Adversaries
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
no-adversary capacity
zero authentication capacity
unsecured communications settings
underlying channel
transmitted sequences
telecommunication security
telecommunication channels
sufficient condition
stochastic encoder
Scalability
Resiliency
resilience
received information
pubcrawl
positive authentication capacity
noisy versions
Adversary Models
mildly myopic adversaries
Metrics
message authentication
malicious adversary
keyless authentication
Human behavior
essentially omniscient adversary
deterministic encoder
Cryptographic Protocols
channel states
channel condition
channel coding
channel capacity
binary channel model
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
biblio
Multi-format speech perception hashing based on time-frequency parameter fusion of energy zero ratio and frequency band variance
Submitted by grigby1 on Fri, 12/11/2020 - 2:43pm
resilience
time-frequency parameter fusion
time-frequency features
Time-frequency Analysis
Time Frequency Analysis
speech signal processing
Speech recognition
speech processing
speech content authentication
sensor fusion
security
Scalability
Robustness
Resiliency
Cryptography
pubcrawl
perceptual hash
multiformat speech perception hashing
microsoft windows
Metrics
message authentication
mean filtering
Libraries
key dependence
hash sequence security
frequency band variance
feature extraction
energy zero ratio
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »