Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Key exchange
biblio
A Study of Post Quantum Cipher Suites for Key Exchange
Submitted by grigby1 on Fri, 09/16/2022 - 3:54pm
standardization
Supersingular Isogenies
Ring Learning With Errors (RLWE)
lattice cryptography
Key Pair Generation
Key exchange
Error Code Correcting
Cryptographic Benchmarking
Post Quantum Cryptography (PQC)
codes
Resiliency
security
Wires
forward error correction
digital signature
Resistance
composability
quantum computing
Computers
NIST
Metrics
pubcrawl
biblio
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
Submitted by aekwall on Fri, 02/25/2022 - 9:44am
privacy
performance evaluation
authentication
Protocols
pubcrawl
Resiliency
Internet of Things
Industries
Compositionality
Predictive Metrics
provable security
Elliptic curves
Computers
Bilinear Pairing
identity authentication
Key exchange
biblio
Let’s Attest! Multi-modal Certificate Exchange for the Web of Trust
Submitted by grigby1 on Mon, 01/31/2022 - 4:39pm
composability
OpenPGP
Key exchange
certificates
transport protocols
web of trust
timing
Public key
metadata
privacy
PKI
internet
Ecosystems
Scalability
Resiliency
resilience
Metrics
pubcrawl
biblio
Secure Key Exchange by NFC for Instant Messaging
Submitted by grigby1 on Mon, 01/10/2022 - 11:16am
operating systems
Upper bound
standards
Servers
Scalability
Resiliency
resilience
pubcrawl
Protocols
android encryption
Metrics
man-in-the-middle attack
Key exchange
Instant messaging
Human behavior
End-End Encryption
encryption
Elliptic Curve Diffie-Hellman
biblio
An efficient multi-factor authenticated key exchange with physically unclonable function
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
password
two factor authentication
Servers
secure PUF-MAKE protocol
secure physically unclonable function
Resiliency
PUF-MAKE setting
PUF-embedded device
PUF
pubcrawl
Protocols
authentication
multifactor authenticators
multifactor authentication
multifactor authenticated key exchange
Multi-factor authenticators
Metrics
message authentication
Key exchange
Human Factors
encryption
Cryptographic Protocols
biblio
Physical Layer Key Generation: Securing Wireless Communication in Automotive Cyber-Physical Systems
Submitted by grigby1 on Wed, 11/27/2019 - 1:59pm
Automotive cyber-physical systems
composability
Key exchange
key generation
Metrics
physical layer security
pubcrawl
resilience
Resiliency
symmetric cryptographic algorithm
Wireless communication
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
Elimination of internal attacksfor PUMA in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
multicast protocols
telecommunication security
single sender node
security
Routing protocols
Routing
Resiliency
resilience
receiver nodes
PUMA
pubcrawl
Protocol for Unified Multicasting through Announcements
network resources
multicast routing protocol
communication costs
multicast communication
multicast announcement packet fabrication attack
multicast activity-based overhearing technique
mobile ad hoc networks
Metrics
MANET
MA FabricationAttack
Key exchange
internal attacks
Group communication
fabrication
Conferences
Compositionality
biblio
Attribute-based Key Exchange with General Policies
Submitted by grigby1 on Tue, 10/10/2017 - 9:39am
attribute based encryption
authentication
Key exchange
Metrics
pubcrawl
Resiliency
Scalability
TLS
biblio
Attribute-based Key Exchange with General Policies
Submitted by grigby1 on Mon, 07/24/2017 - 1:06pm
authentication
Key exchange
pubcrawl
Resiliency
Scalability
signature based defense
TLS
1
2
next ›
last »