Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Key exchange
biblio
Secure Architectures of Future Emerging Cryptography SAFEcrypto
Submitted by grigby1 on Mon, 05/22/2017 - 1:55pm
attribute based encryption
composability
digital signatures
identity based encryption
Key exchange
lattice based cryptography
Metrics
post quantum cryptography
pubcrawl
quantum computing security
Resiliency
SAFEcrypto
Scalability
biblio
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
Submitted by grigby1 on Mon, 05/22/2017 - 1:55pm
composability
Key exchange
Learning with errors
Metrics
Post-quantum cryptography
pubcrawl
quantum
quantum computing security
Resiliency
TLS
biblio
UC-secure Two-Server Password-Based Authentication Protocol and Its Applications
Submitted by grigby1 on Tue, 05/16/2017 - 12:24pm
composability
Compositionality
Key exchange
pubcrawl
secret sharing
two-server password-based authentication
universal composability
biblio
Identity-Concealed Authenticated Encryption and Key Exchange
Submitted by grigby1 on Wed, 03/29/2017 - 12:39pm
Asymmetric Encryption
authenticated encryption
composability
Key exchange
Metrics
pubcrawl
Resiliency
white box
white box cryptography
biblio
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
SDKEY-based transparent encryption storage
PIN
prototype system
public key cryptography
public key exchange
Receivers
SDKEY
SDKEY device
SDKEY-based secure storage
message authentication
secure computation environment
sensitive data leakage
smart phones
storage management
system boot
transmission approach
zero-key exchange
encryption
Android phones
Android system
authentication
Ciphers
data files
Data protection
decryption operation
dual-authentication scheme
Android (operating system)
encryption operation
Encryption Storage
encryption transmission
fine-grained encryption scheme
Key exchange
key exchange mechanisms
lock screen
« first
‹ previous
1
2