Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
private key cryptography
biblio
Provably Secure Group Key Management Approach Based upon Hyper-Sphere
Submitted by BrandonB on Wed, 05/06/2015 - 1:49pm
PRF
Vectors
security
secure group communication systems
robust group key management approach
re-keying messages
random number
public key cryptography
pseudorandom function assumption
pseudo-random function (PRF)
provably secure group key management approach
provable security
Protocols
private key cryptography
Algorithm design and analysis
member private point
massive membership change
key management
hyper-sphere theory
hyper-sphere
group controller
Group communication
GC
Galois fields
Educational institutions
Concrete
central point
biblio
Secure Deduplication with Efficient and Reliable Convergent Key Management
Submitted by BrandonB on Wed, 05/06/2015 - 1:37pm
private key cryptography
storage space reduction
storage management
Servers
security model
secure deduplication
reliable convergent key management
Reliability
ramp secret sharing scheme
public key cryptography
proof of ownership
baseline key management scheme
key management
encryption
Educational institutions
Dekey
Deduplication
data deduplication
convergent encryption
cloud storage
Cloud Computing
Bismuth
biblio
Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
centralised key manager
dynamic topology
MANETs
mobile ad hoc networks
multicast communication
multicast transmission security
network simulator tool
private key cryptography
private key distribution
public key cryptography
rekeying technique
secure intercluster communication technique
tamper data proofing
telecommunication security
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 10:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme
biblio
New paradigms for access control in constrained environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:53pm
Internet of Things
tamper-proof secret keys
standard compliant security protocols
Servers
SCADA
Reliability
PUF
private key cryptography
physical unclonable functions
Oscillators
open systems
mobile computing
message authentication
IoT
interoperability
Access Control
identity management framework
field programmable gate arrays
eSIM
embedded subscriber identity module
constrained resource server
constrained M2M devices
cellular connectivity
Building automation
authorization scheme
authorization
authorisation
authentication
access management framework
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)
biblio
Application H-Secure for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 1:16pm
mobile operating system
Graphical Password
graphical user interfaces
H-Secure application
invasive software
malicious code
malware
Mobile communication
mobile computing
Mobile handsets
free-download content
mobile operating systems
mobile security applications
open devices
personal data
private key cryptography
Servers
smart phones
unauthorized person
Web server
confidential file storage
Android (operating system)
Android smart phones
application stores
authentication
authorisation
business applications
business data
confidential business information
confidential data storage
AES Encryption and Decryption
data access
decryption process
destination servers
employee-owned device
encrypted file
encryption
encryption key
free-download apps
biblio
Public Physical Unclonable Functions
Submitted by BrandonB on Thu, 04/30/2015 - 2:23pm
physical unclonable function (PUF)
trusted information flows
time gap
simulation possible
secret-key technology
second PPUF generation
representative PPUF architectures
public PUF (PPUF)
public PUF
public protocols
public physical unclonable functions
Public key
Protocols
process variation
private key cryptography
analog domain
one-time hardware pads
Logic gates
laborious systems
Integrated circuit modeling
integrated circuit
Hardware Security
Hardware
direct execution
digital PPUF
device aging
Cryptography
Cryptographic Protocols
crucial PUF limitation
« first
‹ previous
1
2
3
4
5
6
7
8