Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security protocols
biblio
Formal Computational Unlinkability Proofs of RFID Protocols
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
pubcrawl
unlinkability
Turing machines
tools
Theorem Proving
security protocols
security of data
RFIDs
RFID protocols
RFID
Resiliency
radiofrequency identification
communication complexity
Protocols
Human Factors
Human behavior
Hash functions
formal computational unlinkability proofs
Cryptography
Cryptographic Protocols
Computational modeling
computational model
computational complete symbolic attacker
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Submitted by BrandonB on Fri, 05/01/2015 - 9:47am
Smart Grids
network performance
network resiliency improvement
plant-generation local area networks
Protocols
SAE
security attacks
security protocols
simultaneous authentication-of-equals
Smart Grid
smart grid mesh network security enhancement
neighborhood area networks
smart power grids
substation local area networks
Substations
trees (mathematics)
wireless LAN
wireless local area networks
wireless mesh networks
wireless sensor networks
WLAN
efficient mesh security association
Computer crime
computer network performance evaluation
computer network security
cost-ef- fective communications
Cryptographic Protocols
cyber attack
denial-of-service attack model
distributed mesh sensor networks
dynamic key distribution strategy updating
authentication
EMSA
HAN
home area networks
home networks
IEEE 802.11s
Logic gates
Merkle tree 4-way handshaking scheme
Mesh networks
NAN
file
Not-quite-so-broken TLS: Lessons in Re-engineering a Security Protocol Specification and Implementation
Submitted by Katie Dey on Thu, 04/23/2015 - 6:42pm. Contributors:
David Kaloper Mersinjak
Anil Madhavapeddy
Hannes Mehnert
Peter Sewell
Presented as part of the
2015 HCSS conference
.
Abstract:
Validation and Verification
Foundations
security protocols
National HCSS Conference 2015
Academia
Abstract
Presentation
HCSS'15
Sustainable Integrity (HCSS'15)
« first
‹ previous
1
2
3