Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
Analysis of GPGPU-Based Brute-Force and Dictionary Attack on SHA-1 Password Hash
Submitted by grigby1 on Fri, 09/04/2020 - 3:36pm
general-purpose computing on graphics processing unit
brute force attacks
word-list
SHA-1 password hash
SHA-1
secure hash algorithm
password hash
mask-attack
hashed password data
GPGPU-based cracking
GPGPU-based brute-force attack
Cryptography
dictionary attack
brute-force
authentication data
policy-based governance
Human Factors
pubcrawl
encrypted file
message authentication
file organisation
authorisation
biblio
Biometric Authentication Security System Using Human DNA
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
biometric encryption
System authentication
human DNA based security systems
Human DNA
human biometric characteristics
cryptosystem technique
Cryptography System
biometric authentication security system
biometric features
DNA
Cryptography
system security
resilience
biometrics (access control)
Scalability
message authentication
Resiliency
Metrics
pubcrawl
biblio
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
Submitted by grigby1 on Thu, 08/13/2020 - 5:22pm
revocation overhead
privacy
privacy-preserving authentication
private key cryptography
pseudonymous certificates
pseudonyms
pubcrawl
Public key
resilience
Resiliency
n) threshold secret sharing
Roads
Scalability
secret sharing
Shamir (t
telecommunication security
VANET
vehicular ad hoc networks
vehicular communications
DCS schemes
anonymous messaging
authentication
authentication overhead
authorisation
backward security
certificate revocation list
certificate updating overhead
CPPT
data privacy
anonymous communications
ECPP scheme
EMAP scheme
forward security
framed attacks
hash chain
hash chains
hybrid scheme
message authentication
biblio
A Secure Authentication and Key Establishment Scheme for Wearable Devices
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
resilience
wireless sensor networks
Wireless communication
Wireless body area networks
smart-home
smart-healthcare
Servers
sensors
security shortcomings
secure services
secure mutual authentication
secure authentication
Scalability
Resiliency
anonymous messages
pubcrawl
message authentication
Medical services
lightweight mutual authentication
lightweight anonymous user authentication
legitimate users
key establishment scheme
computer network security
body area networks
authorisation
authentication
anonymous messaging
biblio
Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
privacy-preserving warning message dissemination
Human Factors
internet
Internet of Things
Internet of Vehicles
lightweight vehicles
message authentication
message integrity
Metrics
Human behavior
pubcrawl
resilience
Resiliency
Scalability
secure privacy-preserving dissemination scheme
vehicular ad hoc networks
verifiable encryption
Access Control
driver privacy issues
data dissemination
cyber physical systems
Cryptography
conditional privacy preservation mechanism
conditional privacy preservation
computer network security
cloud-assisted IoV
cloud-assisted Internet
Cloud Computing
attribute-based message encryption schemes
attribute-based encryption
anonymous vehicle authentication
anonymous messaging
anonymous identity-based signature technique
biblio
An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
Protocols
wireless environment
verifiable secret sharing(VSS)
verifiable secret sharing
vehicular ad hoc networks
Vehicular ad hoc network(VANET)
VANET
Traffic Safety
telecommunication traffic
telecommunication security
Security analysis
Scalability
Resiliency
resilience
pubcrawl
anonymous conditional authentication scheme
privacy-preserving requirements
privacy-preserving authentication scheme
Privacy-preserving
privacy
mutual authentication phase
message generation
message authentication code(MAC)
message authentication code
message authentication
data privacy
Cryptography
communication overhead
authentication
anonymous messaging
biblio
Anonymous Authentication and Key Agreement Protocol for LTE Networks
Submitted by grigby1 on Thu, 08/13/2020 - 5:20pm
key agreement protocol
standard TS
specific base station
signature
Scalability
Resiliency
resilience
pubcrawl
pseudorandom permutation
pseudo IMSI
Protocols
mobile terminal
message authentication
LTE networks
Long Term Evolution
3G mobile communication
internet
International Mobile Subscriber Identity
high-speed wireless communication standard
fake stations
Cryptographic Protocols
communication standard
authentication processes
authentication and key agreement protocol
authentication
authenticated scheme suitable
anonymous messaging
anonymous authentication
anonymous
3GPP
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
ECC
trusted scheme
SE-Enc
encoding scheme
asymmetric cryptography
Asymmetric Encryption
signature
Internet of Things devices
Compositionality
authenticated encryption
encoding
security requirements
encryption
Elliptic curves
Elliptic curve cryptography
Heuristic algorithms
public key cryptography
message authentication
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Internet of Things
biblio
Identity-Based Aggregate Signature Scheme in Vehicle Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
message authentication
vehicular ad hoc networks
vehicle network
vehicle identity
vehicle anonymity
vehicle ad-hoc network
VANET
telecommunication security
Resiliency
privacy preserving
privacy
Metrics
message signatures
pubcrawl
identity-based aggregate signature scheme
digital signatures
data privacy
Cryptography
Compositionality
Cloud Computing
authorisation
authentication
Aggregates
aggregate signature algorithm
Aggregate Signature
Ad Hoc Network Security
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »