Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Key Distribution
biblio
An Efficient Key Generation Scheme for Secure Sharing of Patients Health Records using Attribute Based Encryption
Submitted by grigby1 on Thu, 07/13/2023 - 12:48pm
Manuals
personal health record
efficient encryption
Key Distribution
key generation
public key cryptosystems
attribute-based encryption
Scalability
simulation
encryption
composability
Computational modeling
Medical services
Resiliency
resilience
pubcrawl
Cloud Computing
biblio
Security-enhanced Key Distribution Based on Chaos Synchronization Between Dual Path-injected Semiconductor Lasers
Submitted by grigby1 on Fri, 09/16/2022 - 4:55pm
security
pubcrawl
Metrics
Correlation
composability
chaos
Delay effects
Synchronization
forward error correction
chaos synchronization
Resiliency
Key Distribution
external injection
semiconductor laser
semiconductor lasers
biblio
Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols
Submitted by grigby1 on Thu, 07/14/2022 - 3:44pm
pubcrawl
Hardware
Scalability
Protocols
Computers
quantum computing
Resistance
quantum cryptography
Market research
QKD
Technological innovation
classical cryptography
Key Distribution
quantum computing security
biblio
Secure Key Management Scheme With Good Resiliency For Hierarchical Network Using Combinatorial Theory
Submitted by aekwall on Fri, 02/04/2022 - 10:36am
wireless sensor networks
Base stations
Wireless communication
pubcrawl
Routing protocols
Resistance
Buildings
key management
Reliability engineering
Resiliency
BIBD
combinatorial design
Key Distribution
key refreshment
biblio
Secure Key Generation and Distribution Using Polarization Dynamics in Fiber
Submitted by grigby1 on Tue, 08/31/2021 - 12:09pm
Fluctuations
Human behavior
Key Distribution
Metrics
Optical fiber amplifiers
Optical fiber networks
Optical fiber polarization
Optical interferometry
pubcrawl
random key generation
resilience
Resiliency
Scalability
secure key generation
state of polarization
Stokes parameter
biblio
Modeling Cryptographic Protocols Using the Algebraic Processor
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
Human behavior
Resiliency
remote modeling
remote computers
pubcrawl
private key cryptography
MPEI algebraic processor
Metrics
Mathematical model
key distribution protocols functionality
Key Distribution
Kerberos protocol
Kerberos
internet
information protection
algebra
El Gamal signature
education-oriented capabilities
Department of Mathematical Modeling
Data models
cryptograthic protocol
Cryptography
Cryptographic Protocols
cryptographic primitives
computer network
Computational modeling
chosen cipher text attack
automata theory
automata models
automata
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
Security in a Distributed Key Management Approach
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
key management
user-specific keys
single-tenant scenario
Servers
sensitive data
Scalability
Runtime
Resiliency
resilience
pubcrawl
privacy breach data
outsourcing
Metrics
application providers
Key Distribution
Human behavior
encryption
distributed key management approach
Databases
data privacy
data owners
Cryptography
Cloud Security
cloud provider
Cloud Computing
classified records
biblio
A scalable and secure key distribution scheme for group signature based authentication in VANET
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
authentication
group signature
Key Distribution
privacy
Protocols
pubcrawl
Public key
Roads
Scalability
scalable
Scalable Security
security
Ubiquitous Computing Security
VANETs
vehicular ad hoc networks
biblio
Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices
Submitted by grigby1 on Thu, 05/18/2017 - 3:09pm
Key Distribution
Measurement
Metrics
nonlocal games
privacy
privacy models
privacy models and measurement
pubcrawl
quantum computing security
quantum cryptography
random-number generation
untrusted device
1
2
next ›
last »