Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
protocol design
biblio
ConForm: In-band Control Plane Formation Protocol to SDN-Based Networks
Submitted by grigby1 on Tue, 03/16/2021 - 1:10pm
SDN-based networks
OpenFlow-based SDN networks
optical switches
policy-based approach
protocol design
Protocols
pubcrawl
resilience
Resiliency
network topology discovery
security
Self-establishment
software defined networking
TCPIP
telecommunication network topology
telecommunication traffic
Topology
transport protocols
In-Band Control Plane
bootstrap protocol
clean slate
clean slate architectures
collaboration
computer network management
data plane
Formal Specification
Human behavior
Bootstrap
In-band Control Plane Formation Protocol
inband control plane
IP networks
management plane activities
management plane related activities
Metrics
network startup
network topology
biblio
HSDC–Net: Secure Anonymous Messaging in Online Social Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
Scalability
messaging application providers
online social networks
practical protocol
privacy
protocol design
Protocols
pubcrawl
resilience
Resiliency
message senders
SDC-net
secure anonymous messaging
security issues
Servers
short stability issue
social networking (online)
strongest anonymity guarantees
trust ISP
DC–net
anonymous communications
anonymous messaging
Australia
blockchain users
computer network security
Cryptographic Protocols
Cryptography
data privacy
DC-net suffers
anonymization
dining cryptographers network protocol
disruption management
disruption management subprotocols
hiding contents
HSDC-net achieves low latencies
HSDC-net protocol
internet
message publishing
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 9:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
Using model checking for Trivial File Transfer Protocol validation
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
Protocols
validation
UDP
trivial file transfer protocol
transport protocols
TFTP protocol
TFTP
SPIN
Software verification
software engineering
exhaustive state space search
protocol design
formal verification
Internet user datagram protocol
model based checking tool
modeling
Promela
authentication
concurrency defect detection
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
biblio
Integrity based relationships and trustworthy communication between network participants
Submitted by BrandonB on Fri, 05/01/2015 - 8:10am
OSI layer 2
Unicast
trustworthy communication
Trusted Platform Module
Trusted Computing
trust establishment
trust
Servers
security
Protocols
protocol design
Payloads
participating node
authenticated node
operating system integrity
network participants
integrity based relationship
integrity
insider threat
industrial networks
encryption
cyber-physical systems
Cryptographic Protocols
computer network security
authentication protocol
authentication