Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure communications
biblio
A Blockchain Model for Secure Communications in Internet of Vehicles
Submitted by grigby1 on Wed, 06/30/2021 - 2:57pm
pubcrawl
vehicular ad hoc networks
software-defined networking
security
secure communications
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
blockchain
Metrics
Internet of Vehicles
Internet of Things
Human Factors
Human behavior
High Performance Blockchain Consensus
cyber physical systems
Computational modeling
biblio
Fog-Based Secure Communications for Low-Power IoT Devices
Submitted by grigby1 on Tue, 01/21/2020 - 10:39am
authorization
confidentiality
encryption
Fog computing
Internet-of-Things
Proxy re-encryption
pubcrawl
Publish/Subscribe
resilience
Resiliency
Scalability
secure communications
security
biblio
Conifer: Centrally-Managed PKI with Blockchain-Rooted Trust
Submitted by aekwall on Mon, 11/18/2019 - 10:48am
public keys
centralized transparency
centrally-managed PKI
Conifer
CONIKS
cryptographic identities
domain names
highly decentralized trust
insecure networks
central trusted parties
secure distributed ledger
secure naming systems
security guarantees
traditional centralized PKIs
traditional centralized-trust systems
trustworthy binding
user-facing names
PKI Trust Models
internet
Scalability
secure communications
Resiliency
Human behavior
pubcrawl
bitcoin
Metrics
blockchain
Monitoring
data structures
Public key
public key cryptography
flexibility
active attackers
blockchain-agnostic way
blockchain-rooted trust
blockchains
biblio
Attribute Based Content Security and Caching in Information Centric IoT
Submitted by aekwall on Mon, 08/05/2019 - 9:45am
Router Systems Security
Ciphertext policy attribute-based encryption
Information Centric Networks
information-centric networks
IoT
pubcrawl
Resiliency
Scalability
secure communications
biblio
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
mobile data collectors
composability
pubcrawl
Human behavior
Resiliency
whitebox cryptography
tampered drones
Table lookup
software-based attestation
software integrity
software attestation
secure communications
secret key protection
privacy-sensitive data
security of data
malicious physical/cyber attacks
group attestation scheme
drones
data repositories
data memory
data encryption
code attestation technique
malware
attestation
secret keys
private key cryptography
data privacy
encryption
biblio
Three Innovative Directions Based on Secure Elements for Trusted and Secured IoT Platforms
Submitted by grigby1 on Mon, 11/13/2017 - 11:00am
SE TLS servers
trusted platform modules
trusted IoT platforms
Trusted Computing
TLS/DTLS SE servers
TLS protocols
SIM modules
secured IoT platforms
secure elements
secure communications
authorisation
Resiliency
RACS authorization servers
pubcrawl
mutual authentication
Internet of Things
DTLS protocols
composability
CoAP DTLS clients
biblio
Storage as a parameter for classifying dynamic key management schemes proposed for WSNs
Submitted by grigby1 on Wed, 03/29/2017 - 11:33am
policy-based governance
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network management
target tracking
storage
security
secure communications
Resiliency
resilience
pubcrawl
Artificial Neural Networks
neural networks security
Neural networks
neural network
Monitoring
Metrics
knowledge based systems
key management
healthcare monitoring
dynamic key management scheme classification
Computers
composite keys
border control
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity