Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
symmetric cryptography
biblio
Proposal of HMAC based Protocol for Message Authenication in Kerberos Authentication Protocol
Submitted by grigby1 on Fri, 03/03/2023 - 4:16pm
telecommunication traffic
kerberos security
symmetric cryptography
Key Distribution System
codes
unauthorized access
HMAC
Electronic mail
Public key
Servers
Protocols
authentication
message authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
Asymmetric Encryption
securing multiparty communication
MultiRSA
multiple recipients
Multi-recipient Encryption
lightweight scalable multirecipient asymmetric cryptographic scheme
lightweight AMOUN
high computational cost
group membership changes
dynamic networks
chosen plaintext attack
Chinese remainder theorem
Cathode ray tubes
asymmetric cryptography
communication overhead
encryption
network resources
symmetric cryptography
Compositionality
Security analysis
public key cryptography
Public key
Metrics
privacy
pubcrawl
Human behavior
Resiliency
decryption
Computational efficiency
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
pseudonyms
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
computational overhead
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
security
VANET
public key cryptography
attacks
authentication
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
Cryptography
biblio
Enhanced Lightweight Cloud-assisted Mutual Authentication Scheme for Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
tools
wearables security
Wearable devices
wearable computers
symmetric cryptography
secure authentication process
lightweight cloud-assisted mutual authentication scheme
IoT authentication
cloud-assisted authentication scheme
Authentication Protocols
Wireless fidelity
IoT security
public key cryptography
message authentication
authentication
security
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
Protocols
Cryptographic Protocols
telecommunication security
data privacy
Servers
Scalability
Cloud Computing
IoT
biblio
Quantum Grover Attack on the Simplified-AES
Submitted by aekwall on Mon, 03/18/2019 - 8:53am
quantum computing security
black box encryption
Block Cipher
composability
Grover attack
Metrics
pubcrawl
Quantum cryptanalysis
Quantum simulation
Resiliency
symmetric cryptography
biblio
Comparing the Usability of Cryptographic APIs
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
GitHub
Usable Security
usability
symmetric cryptography
software libraries
Security by Default
Scalability
Resiliency
Python developers
pubcrawl
programming
Libraries
Guidelines
API usability
documentation accessibility
documentation
cryptography errors
Cryptography
cryptographic library
cryptographic application programming interfaces
cryptographic API usability
controlled experiment
code security
auxiliary features
application program interfaces
biblio
Scalable and privacy-preserving authentication protocol for secure vehicular communications
Submitted by grigby1 on Fri, 11/03/2017 - 10:31am
Safety
vehicular communications security
vehicular ad hoc networks
vehicle to vehicle communications
vehicle to infrastructure communications
VANETs
VANET
V2V
V2I
symmetric hash message authentication code
symmetric cryptography
security
Scalable Security
scalable and privacy-preserving authentication protocol
Scalability
asymmetric cryptography
public-key infrastructure
public key cryptography
pubcrawl
Protocols
privacy-preserving authentication protocol
privacy
PKI-based authentication protocols
PKI
message authentication
ESPA protocol
efficient
Cryptography
Cryptographic Protocols
authentication
biblio
Symmetric Cryptography Using Multiple Access Circular Queues (MACQ)
Submitted by grigby1 on Mon, 03/27/2017 - 9:52am
black box
black box encryption
Block Ciphering Algorithm
composability
Cryptography
decryption
encryption
Feistel cipher
Metrics
pubcrawl
Random NumberGenerators (RNGs)
Resiliency
S-box
symmetric cryptography
biblio
Delegated Authenticated Authorization for Constrained Environments
Submitted by BrandonB on Mon, 05/04/2015 - 1:54pm
Internet of Things
trusted host
symmetric cryptography
smart objects
resource-constrained node
Protocols
protocol
performance evaluation
Peer-to-peer computing
authentication
Face
delegated authenticated authorization
Cryptographic Protocols
cross-domain setting
constrained environments
client authentication
authorization