Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security protocol
biblio
On the Security of Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
Internet of Things
Cloud Computing
security
pubcrawl
resilience
Scalability
Medical services
Protocols
Fog computing
wireless networks
protocol
Resiliency
authentication protocol
security protocol
biblio
Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 12:20pm
Ad Hoc Network Security
Ad hoc networks
authentication protocol
Compositionality
Intelligent Transportation Systems
Internet of Things
Metrics
protocol
Protocols
pubcrawl
resilience
Resiliency
security
security protocol
sensors
biblio
A Lightweight Dual Authentication Protocol for the Internet of Vehicles
Submitted by grigby1 on Wed, 06/30/2021 - 3:55pm
Metrics
tools
security protocol
Resistance
Resiliency
resilience
radiofrequency identification
pubcrawl
Protocols
authentication
lightweight authentication
Internet of Vehicles
internet
Human Factors
Human behavior
formal analysis
data transfer
cyber physical systems
biblio
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Protocols
virtual security function
software defined security service
Software
security protocol
security policies
security
SDN
pubcrawl
Network Security Architecture
Predictive models
policy-based governance
NFV
Monitoring
control systems
Cloud Security
Cloud Computing
biblio
A Multi Agent-Based Security Protocol for Securing Password Management Application
Submitted by grigby1 on Tue, 04/27/2021 - 2:16pm
computer architecture
Cryptography
pubcrawl
Human behavior
resilience
Resiliency
authentication
Protocols
mobile agents
Metrics
Compositionality
password
Browser Security
architecture
security protocol
multi-agent
biblio
Network Parameter Analysis; ad hoc WSN for Security Protocol with Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:02pm
pubcrawl
wireless sensor networks
Wireless communication
unsecured network
telecommunication security
soft computing prediction tool
security protocol
security
Rogue Access Point detection
Rogue Access Point (RAP)
Resiliency
resilience
real-time systems
RAP detection
Ad hoc networks
Protocols
network parameter analysis
Monitoring
mobile devices
Metrics
Hidden Markov models
Fuzzy logic
fuzzy controller
Cyber Physical System
Conferences
Communication system security
ad hoc WSN
biblio
Analysis of the Noise Source Entropy Used in OpenSSL’s Random Number Generation Mechanism
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
operating systems
random key generation
Unix-like operating systems
TCP-IP layer
security protocol
secure socket layer
real-time clock
OpenSSL random number generation
open source library
noise source entropy
Noise
devrandom
cryptographic random numbers
cryptographic key generation
IP networks
OpenSSL
random number generation
Unix
public domain software
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
transport protocols
Cryptography
Scalability
biblio
Hardware Security Threats Against Bluetooth Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:05pm
hardware security threats
wireless mesh networks
smartphone platforms
security protocol
resilience
pubcrawl
physical attacks
network topology
Metrics
mesh topology
Mesh networks
Internet of Things
authentication
Hardware Security
encryption
Cryptographic Protocols
composability
Bluetooth special interest group
Bluetooth mesh networks
Bluetooth mesh
bluetooth low energy
Bluetooth
BLE technology
BLE networks
biblio
A Practical One-Time File Encryption Protocol for IoT Devices
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
security issues
OTFEP
privacy issues
Protocols
pubcrawl
Resiliency
Scalability
scalable one-time file encryption protocol
secure key distribution mechanism
node scalability
security protocol
Servers
small file
specialized security requirements
stream file
system manager
third-party auditors
file encryption
cryptographic techniques
data privacy
Data protection
database
database management systems
Electronic mail
Elliptic curve cryptography
encryption
Cryptographic Protocols
file organisation
file protection
Internet of Things
IoT
IoT devices
IoT environment
Metrics
biblio
Mutual Authentication Protocol for RFID Based on ECC
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Public key
tracking attacks
telecommunication security
system internal attack
Servers
security scalability
security protocol
Scalability
RFID systems
Resists
Resiliency
radiofrequency identification
radio frequency identification
authentication
pubcrawl
Protocols
mutual authentication protocol
mutual authentication
Metrics
Internet of things security and privacy
forward security
Elliptic curve cryptography
ECC
Denial of Service attacks
Cryptographic Protocols
camouflage attacks
1
2
next ›
last »