Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security protocols
biblio
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
open source Virtual Private Network
WireGuard virtual private network protocol
vpn
Virtual private networks
verification
transport data messages
standards
security protocols
pubcrawl
Protocols
protocol verification
privacy
policy-based governance
Policy Based Governance
authorisation
Noise Protocol Framework
IP networks
Elliptic curve cryptography
CryptoVerif proof assistant
Cryptographic Protocols
cryptographic protocol
cryptographic proof
computer network security
computational model
Compositionality
composability
collaboration
biblio
Automated Verification of Accountability in Security Protocols
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
mechanized method
traditional trust assumptions
tools
security violation
security protocols
security protocol design
security property
pubcrawl
Protocols
protocol-agnostic definition
protocol verification
privacy
policy-based governance
Policy Based Governance
accountability
formal verification
formal methods and verification
Cryptography
Cryptographic Protocols
computer security
Compositionality
composability
collaboration
cognition
certificate transparency
Calculus
accountable algorithms protocol
accountability automated verification
biblio
A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Submitted by aekwall on Mon, 05/20/2019 - 9:03am
Protocols
threshold cryptography
threshold
telecommunication security
Servers
security protocols
security of data
securities issues
RSA cryptography
RSA
Resiliency
public key cryptography
pubcrawl
authentication
protocol models
protocol
Metrics
Kerberos authentication protocol
Kerberos
Human behavior
high security
Elliptic curve cryptography
ECC
Cryptographic Protocols
Cloud Security
Cloud Computing
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 9:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication
biblio
Studying TLS Usage in Android Apps
Submitted by grigby1 on Thu, 01/31/2019 - 11:16am
resilience
Transport Layer Security
Transport Layer Protocols
TLS
SSL
security protocols
Secure Sockets Layer
Scalability
Resiliency
android
pubcrawl
network measurements
Mobile Security
mobile
Metrics
Human Factors
Human behavior
android encryption
biblio
Studying TLS Usage in Android Apps
Submitted by grigby1 on Wed, 05/30/2018 - 3:02pm
pubcrawl
Transport Layer Security
Transport Layer Protocols
TLS
SSL
security weaknesses
security protocols
Secure Sockets Layer
Resiliency
resilience
android
policy-based governance
network measurements
Mobile Security
mobile
Metrics
Human Factors
Human behavior
collaboration
biblio
Supporting security protocols on CAN-based networks
Submitted by el_wehby on Mon, 05/14/2018 - 1:27pm
Cryptographic Protocols
standards
shared key generation protocol
security protocols
security
Protocols
physical bus segregation
Payloads
Observers
network security
Electronic mail
arbitrary binary Boolean functions
controller area networks
Controller area network (CAN)
controller area network
computer network security
CAN-based networks
CAN-based automotive systems
CAN XR
CAN protocol security-oriented enhancements
CAN data-link layer
Boolean functions
1646317
biblio
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
Submitted by K_Hooper on Wed, 02/28/2018 - 10:31am
Reactive power
verification tool
transport protocols
tools
Theorem Proving
standards
standard Transport Layer Security handshake
security protocols
security of data
security
Resistance
relative soundness result
algebra
pubcrawl
Protocols
proof assistants
proof argument
pen-and-paper proof
Isabelle/HOL
Isabelle-HOL security
formal verification
constraint-based approach
Compositionality
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
An IDE for the Design, Verification and Implementation of Security Protocols
Submitted by grigby1 on Wed, 01/10/2018 - 11:19am
intuitive language AnB
verification
tools
software engineering
security protocols
security of data
secure distributed applications
Resiliency
pubcrawl
Protocols
protocol verification
program verification
program compilers
model checker OFMC
Java
AnBx compiler
integrated development environment
implementation
Generators
formal verification
Formal Specification
formal modelling
formal method tools
encryption
Eclipse-based IDE
design
dependable distributed applications
composability
compiler security
code generator
« first
‹ previous
1
2
3
next ›
last »