Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
EAP
biblio
The improvement of wireless LAN security authentication mechanism based on Kerberos
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
request message
Metrics
OPNET simulation
password
Protocols
pubcrawl
public key cryptography
public key encryption
replay attacks
message serial number
Resiliency
retransmission message
Servers
transfer message
vulnerable password guessing attacks
wireless LAN
wireless LAN security authentication mechanism
EAP-TLS authentication protocol
asymmetric key encryption method
authentication
authentication server
computer network security
Cryptographic Protocols
Cryptography
dictionary attacks
EAP
802.1X / EAP authentication protocol
Human behavior
KEAP protocol
Kerberos
Kerberos extensible authentication protocol
Kerberos protocol authentication
man-in-the-middle attack
message sequence number
biblio
Privacy Preserving in TPA for Secure Cloud by Using Encryption Technique
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
secure cloud
privacy identification
privacy preserving
Protocols
pubcrawl
public auditing
public verifiers
resilience
Resiliency
Metrics
Secure storage
Servers
shared data
software/hardware error
Task Analysis
TPA
VerifyProof
data services
auditing task
Cloud Computing
cloud data
Compositionality
Cryptography
data holders
data integrity
data privacy
auditing
EAP
encryption
encryption audits
Encryption technique
extensible authentication protocol
human error
liberated encryption standard
biblio
An IDMS approach towards privacy and new requirements in IoT
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
mobile clients
user-centric
service provider
Scalability
Resiliency
pubcrawl
private information
privacy
personal authentication device
PAD
OAuth
Mobility
mobile radio
AVISPA
IoT identity management system
Internet of Things
IDMS
Identity provider IoT
Identity management
Human behavior
EAP
DTLS
domain
data privacy
Cryptographic Protocols
Cardinality
biblio
Verification of a Multi-Domain Authentication and Authorization Infrastructure Yamata-no-Orochi
Submitted by grigby1 on Tue, 09/26/2017 - 12:32pm
Access Control
collaboration
Compositionality
Diameter Base Protocol
EAP
multi-domain authentication and authorization
privacy
protocol verification
pubcrawl
Yamata-no-Orochi
biblio
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
IEEE 802.15.4 networks
Zigbee
wireless LAN
Servers
security
Protocols
Payloads
Local area networks
IoT networks
Internet of Things
internet
802.1X
IEEE 802.15.4
IEEE 802.15 Standards
extensible authentication protocol
EAP
Cryptographic Protocols
computer network security
authorization
authorisation
authentication
access control functionality