Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transport Layer Security
biblio
Studying TLS Usage in Android Apps
Submitted by grigby1 on Wed, 05/30/2018 - 4:02pm
pubcrawl
Transport Layer Security
Transport Layer Protocols
TLS
SSL
security weaknesses
security protocols
Secure Sockets Layer
Resiliency
resilience
android
policy-based governance
network measurements
Mobile Security
mobile
Metrics
Human Factors
Human behavior
collaboration
biblio
Trust but Verify: Auditing the Secure Internet of Things
Submitted by grigby1 on Mon, 03/26/2018 - 12:56pm
resilience
web of trust
user privacy in the cloud
User behavior
Transport Layer Security
TLS-rotate and release
TLS-RAR
TLS 1.3
TLS
Scalability
Resiliency
auditing
pubcrawl
proxy
Networked Control Systems Security
Middlebox
Metrics
IoT
Internet of Things
Decrypt
composability
biblio
Software Defined Networking: Identification of Pathways for Security Threats
Submitted by grigby1 on Fri, 10/27/2017 - 12:10pm
distributed denial of service
threat mitigation
Transport Layer Security
secure socket layer
SDN
role-based access control
Out-of-Band
Open Support System
Open Flow
Metrics
Data-Control plane interface
Control Plane Interface
Application-Control Plane Interface
Scalability
Human behavior
Resiliency
pubcrawl
biblio
Measuring the Security Harm of TLS Crypto Shortcuts
Submitted by K_Hooper on Wed, 09/27/2017 - 1:22pm
pubcrawl
Transport Layer Security
TLS
SSL Trust Models
SSL
session resumption
secure socket layer
scalabilty
Resiliency
Cross Layer Security
NSA
nation state attacker
Metrics
Human behavior
government surveillance
GCHQ
edward snowden
biblio
Efficient Authentication of Resource-constrained IoT Devices Based on ECQV Implicit Certificates and Datagram Transport Layer Security Protocol
Submitted by grigby1 on Fri, 08/18/2017 - 2:18pm
Human behavior
implicit certificate
IoT security
key agreement
key management
Metrics
pubcrawl
Resiliency
Scalability
Transport Layer Security
biblio
Identifying Encrypted Malware Traffic with Contextual Flow Data
Submitted by grigby1 on Tue, 05/30/2017 - 1:11pm
artificial intelligence security
composability
computational intelligence
encryption
machine learning
malware
malware classification
Metrics
Network Monitoring
pubcrawl
Resiliency
Transport Layer Security
windows operating systems security
biblio
Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore
Submitted by BrandonB on Tue, 05/05/2015 - 9:01am
password-protected keystore
Web protocols
Transport Layer Security
TOTP algorithm
TOAST scheme
TLS seed exchange
time-based OTP authentication
strong key derivation function
software-based token
Servers
security requirements
secure tunnel
Radiation detectors
PBEWithSHAANDTwofish-CBC function
authentication
one-time password
multifactor authentication cryptosystem
multifactor authentication
mobile TOTP scheme
Mobile communication
IETF RFC 6239 standard
Google
encrypted offline keystore
cryptosystems development
Cryptography
cryptographic standards
BC UBER keystore
authorisation
biblio
An intelligent agent based privacy preserving model for Web Service security
Submitted by BrandonB on Mon, 05/04/2015 - 2:56pm
quality of service
XML
WSDL
web services
Web service security
UDDI
Transport Layer Security
TLS
SSL
SOAP
Simple object access protocol
security of data
secured socket layer
secure channel
quality of services
Cryptography
QoS requirements
Protocols
privacy preserving
OSI layers
multi-agent systems
IP Sec
Internet Protocol Security
internet
intelligent agent based privacy preserving model
intelligent agent
HTTPI protocol
electronic data interchange
data privacy
data exchange
« first
‹ previous
1
2