Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication server
biblio
3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
decentralize identity management system
TTP
trusted third party
three blockchains identity management
telecommunication security
self-generated identity
self-generated certificates
Scalability
Resiliency
public key cryptography
pubcrawl
Metrics
internet
elliptic curves cryptography
Elliptic curve cryptography
Identity management
Cybersecurity
Cryptographic Protocols
computer network security
computer network management
certificate authority
Blockchains Identity Management
blockchain technology
blockchain
autonomous network
authorisation
authentication server
Authentication Protocols
3BI-ECC
biblio
Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
IoT device authentication scheme
Servers
security perspective
Resiliency
resilience
replay attack mitigation
pubcrawl
performance evaluation
multifactor authentication scheme
multifactor authentication
Metrics
man-in-the-middle attack mitigation
IoT device security
IoT device privacy
authentication
Internet-of-Things device authentication
Internet of Things
Human Factors
Human behavior
digital signatures
device capability
device authentication
data privacy
Cryptography
computer network security
authentication server
authentication mechanism
biblio
TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
security
Human behavior
Kerberos
Kerberos biometric blowfish user authentication
message authentication
Metrics
pubcrawl
Registration
Resiliency
secured data access
genuine user
Servers
Ticket Granting
tiger hash
Tiger Hash-based Kerberos biometric blowfish authentication
unauthorized users
user ID
user identity
users ID
cloud server
authenticated user
authentication
authentication accuracy
authentication server
authentications time
authenticity
authorisation
Blowfish encryption
Cloud Computing
Access Control
cloud services
cloud user
confidentiality rate
Cryptography
CS grants
CU
encrypted ticket
encryption
biblio
The improvement of wireless LAN security authentication mechanism based on Kerberos
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
request message
Metrics
OPNET simulation
password
Protocols
pubcrawl
public key cryptography
public key encryption
replay attacks
message serial number
Resiliency
retransmission message
Servers
transfer message
vulnerable password guessing attacks
wireless LAN
wireless LAN security authentication mechanism
EAP-TLS authentication protocol
asymmetric key encryption method
authentication
authentication server
computer network security
Cryptographic Protocols
Cryptography
dictionary attacks
EAP
802.1X / EAP authentication protocol
Human behavior
KEAP protocol
Kerberos
Kerberos extensible authentication protocol
Kerberos protocol authentication
man-in-the-middle attack
message sequence number
biblio
Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
pubcrawl
vTPM DTE
virtual Trusted Platform Module (vTPM)
virtual trusted platform module
virtual TPM dynamic trust extension
virtual machines
trusted platform modules
Trusted Platform Module (TPM)
Trusted Computing
Trust Extension
time token
Servers
Resiliency
real-time systems
public key cryptography
attestation data
pTPM
physical TPM
performance measurements
IK certificate
identity key certificate
Heuristic algorithms
frequent migrations
Elliptic curve cryptography
Computers
composability
authorisation
authentication server
authentication
biblio
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications
Submitted by BrandonB on Wed, 05/06/2015 - 1:35pm
Protocols
Synthetic aperture sonar
smart power grids
smart meter (SM)
smart grid communications
smart grid (SG)
Servers
security
secure remote password protocol
secure remote password (SRP)
public-private key pairs
public key infrastructure
public key cryptography
Public key
authentication
mutual authentication
management overhead
key management protocol
key management
key generator entity
initial password
identity-based cryptography
home networks
home area network
Enhanced identity-based cryptography (EIBC)
Cryptographic Protocols
authorisation
authentication server
biblio
Implementation of security framework for multiple web applications
Submitted by BrandonB on Mon, 05/04/2015 - 2:51pm
MD5
web services
web applications
single sign-on
Servers
security of data
security framework implementation
proxy signature
OpenID
authentication
Informatics
identity management technique
identity management system
encryption
credential problems
Computers
authorization
authentication server