Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kerberos protocol
biblio
Modeling Cryptographic Protocols Using the Algebraic Processor
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
Human behavior
Resiliency
remote modeling
remote computers
pubcrawl
private key cryptography
MPEI algebraic processor
Metrics
Mathematical model
key distribution protocols functionality
Key Distribution
Kerberos protocol
Kerberos
internet
information protection
algebra
El Gamal signature
education-oriented capabilities
Department of Mathematical Modeling
Data models
cryptograthic protocol
Cryptography
Cryptographic Protocols
cryptographic primitives
computer network
Computational modeling
chosen cipher text attack
automata theory
automata models
automata
biblio
A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
Submitted by BrandonB on Tue, 05/05/2015 - 8:03am
password guessing attack
wireless mesh networks
wireless mesh network
synchronisation
storing key
Servers
random numbers
public key encryption
public key cryptography
Public key
Protocols
authentication
malicious software
Kerberos protocol
improved Kerberos protocol
identity authentication scheme
identity authentication
Cryptographic Protocols
clock synchronization
authorization
authentication protocol
biblio
A server-based real-time privacy protection scheme against video surveillance by Unmanned Aerial Systems
Submitted by BrandonB on Fri, 05/01/2015 - 8:29am
multiple privacy servers
video surveillance images
video surveillance
video sharing
video coding
unmanned aerial systems
UAS
surveillance operator
surveillance
Streaming media
Servers
server-based real-time privacy protection scheme
sanitized video
Privacy Policy
privacy
on-board processing unit
camera software
Key Distribution
Kerberos protocol
internet
image processing algorithms
filtering strategies
filtering algorithms
Filtering
encrypted video stream
data privacy
Cryptography
cloud-based servers
cloud-based privacy servers
civilian airspace
Cameras