Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
private key cryptography
biblio
Multi-Mediated Semi-Quantum Key Distribution
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
Protocols
telecommunication security
standards
shared secret key
Servers
semiquantum users
semiquantum key distribution protocol
security
Scalability
Resiliency
resilience
quantum noise
quantum cryptography
public key cryptography
pubcrawl
adversarial quantum server
private key cryptography
policy-based governance
multimediated SQKD protocol
multimediated semiquantum key distribution
Metrics
information theoretic security analysis
information theoretic security
Human Factors
Human behavior
Gain measurement
fully-quantum
Cryptographic Protocols
Companies
arbitrary MM-SQKD protocols
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
biblio
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
QR code technologies
QR code exchanges
Portable computers
optical challenge-response authentication
optical challenge response
mounting concealed file system
mounting authentication scheme
mounting authentication
encrypted QR code
Data Breach
challenge-response scheme
mobile devices
private key cryptography
smart phones
public key cryptography
Mobile Security
cyber physical systems
message authentication
authentication
Cryptography
Ransomware
pubcrawl
Resiliency
mobile computing
invasive software
biblio
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
Submitted by aekwall on Mon, 03/23/2020 - 1:21pm
PUF
random key generation
SRAM PUF
SRAM device
SRAM chips
SRAM chip
SRAM
PUF key generation mechanism
Private keys
fuzzy extractors
fuzzy extractor techniques
error correction coding methods
Error analysis
Arduino mega shield
adjustable memory-based PUF
key generation
IoT
error correction codes
physically unclonable functions
Random access memory
authentication
Metrics
pubcrawl
Human behavior
Resiliency
secret keys
private key cryptography
IoT devices
Internet of Things
encryption
Servers
Scalability
biblio
SIRLC: Secure Information Retrieval using Lightweight Cryptography in HIoT
Submitted by grigby1 on Wed, 03/18/2020 - 12:28pm
pubcrawl
Internet of Things
LiBAC
Light-Weight Cryptography
lightweight break-glass access control
medical information systems
medical records
patient care
patients care
private key cryptography
information retrieval
reduced computational complexity
resilience
Resiliency
secret key generation time
Secure File Sharing
secure information retrieval using lightweight cryptography
SIRLC
therapeutic records
encryption
access permission
attribute based key
Attribute based Key Management
authorisation
authoritative entities
cipher text size
Emergency care
emergency key
emergency supporting representatives
Access Control
enhanced security
ESR
Generators
health care
healthcare Internet of things
HIoT
hospitals
Identity management
biblio
Lightweight Searchable Encryption Scheme Based on Certificateless Cryptosystem
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
keyword encryption
resilience
Resiliency
composability
pubcrawl
third-party manager
secret value
searchable encryption technology
searchable encryption schemes
searchable encryption
public key cryptography
partial private key
multiuser ciphertext retrieval
lightweight searchable encryption scheme
Lightweight
Cryptography
key escrow problem
identity-based cryptosystem
file index
digital signatures
data owner stores
cloud storage environments
cloud server
ciphertext data
certificateless encryption schemes
certificateless cryptosystem
certificate management problem
cloud storage
private key cryptography
cloud data
biblio
Turing Meets Shannon: On the Algorithmic Computability of the Capacities of Secure Communication Systems (Invited Paper)
Submitted by grigby1 on Wed, 03/04/2020 - 4:15pm
active jammer
algorithmic computability
capacity expressions
communication scenarios
composability
Compositionality
Jamming
private key cryptography
pubcrawl
secret key generation
secure communication systems
theoretical cryptography
wiretap channel
biblio
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels
Submitted by grigby1 on Wed, 03/04/2020 - 4:15pm
telecommunication security
physical layer security
private key cryptography
pubcrawl
secret key generation studies
security
software radio
TDD
TDD mode
Pearson correlation coefficient
theoretical analysis
theoretical cryptography
time division duplexing
time division multiplexing
USRP
wireless channel reciprocity
wireless channels
X310 universal software radio peripheral
FDD
channel state information
composability
Compositionality
correlation methods
CSI correlation coefficient
eavesdropping attack
eavesdropping distance
eavesdropping wiretap channel model
channel reciprocity
FDD channel reciprocity
FDD wiretap channels
frequency division duplexing
frequency division multiplexing
indoor radio
indoor wireless CSI measurement system
legitimate channel
N210
biblio
An Access Authentication Algorithm Based on a Hierarchical Identity-Based Signature over Lattice for the Space-Ground Integrated Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
SGIN
lattice based mobile access authentication mechanism
lattice-based cryptography
Lattices
mobile access authentication protocol
mobile radio
mobile users
multi-access systems
private key cryptography
Protocols
L-HIBS scheme
shared session key exchange
SIS problem
small integer solution
space communication links
space-ground integrated network
standard security model
telecommunication security
theoretical cryptography
Compositionality
pubcrawl
access authentication
access authentication algorithm
adaptive selection messages
authentication
authentication delay
bidirectional authentication
composability
signature based defense
computer architecture
Cryptographic Protocols
Cryptography
digital signatures
Generators
hierarchical access authentication architecture
hierarchical identity-based cryptography
hierarchical identity-based signature
biblio
Information Theoretical Secure Key Sharing Protocol for Noiseless Public Constant Parameter Channels without Cryptographic Assumptions
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
matrix algebra
theoretical cryptography
SNR
Signal to noise ratio
Shannon information
Quantization (signal)
pubcrawl
Protocols
protocol restrictions
private key cryptography
privacy amplification procedure
Privacy Amplification
privacy
physical layer security
noiseless public constant parameter channels
artificial noise
key sharing protocol
internet
information theoretical secure key sharing protocol
Eigenvalues and eigenfunctions
eigenvalues
eavesdropper channels
Cryptography
Cryptographic Protocols
cryptographic assumptions
constant parameter noiseless public channel
computer network security
Compositionality
composability
Bit error rate
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »