Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
replay attack
biblio
A lightweight RFID authentication protocol with confidentiality and anonymity
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy
telecommunication security
RFIDs
RFID tags
RFID system
RFID
Resiliency
replay attack
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
protocol
privacy and security
authentication
open wireless radio wave
on-chip CRC function
low-cost passive tags
location trace
lightweight RFID authentication protocol
Internet of Things
Human Factors
Human behavior
Hash functions
eavesdropping prevention
DOS-attack prevention
Cryptography
Cryptographic Protocols
CRC
biblio
Security and privacy for smart grid using scalable key management
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
Public key
symmetric key technique
symmetric key scheme works
smart power grids
Smart Grids
Smart Grid
sensors
secure key management
Scalable Security
scalable key management
Scalability
replay attack
public key cryptography
authentication
pubcrawl
Protocols
power system security
power system management
Needham-Schroeder authentication protocol
Needham Schroder Authentication
man-in-the-middle attack
key management
Fault-Tolerance
fault tolerance
elliptic curve public key technique
Cryptographic Protocols
biblio
"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)"
Submitted by grigby1 on Thu, 02/23/2017 - 12:12pm
mobile computing
wireless network technology
security of data
Repudiation
replay attack
pubcrawl170105
Protocols
privacy protection
privacy
mobile payment protocol
Mobile handsets
mobile devices
client centric model
Mobile communication
key agreement protocol
golden mobile pay center protocol
Golden Circle
GMPCP
GC
financial management
cyber security
Cryptography
Complexity theory
biblio
Group signature entanglement in e-voting system
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
group signature entanglement
security system
security of data
replay attack
Receivers
Qubit
Quantum entanglement
quantum computing
Protocols
politics
man-in-the-middle attack
authentication
Entanglement
entangled state
electronic voting
eavesdropping
e-voting system
digital signatures
database
cheating purposes
ballots
biblio
A Spoofing Attack against a Cancelable Biometric Authentication Scheme
Submitted by BrandonB on Tue, 05/05/2015 - 8:48am
homomorphic encryption algorithms
Vectors
unexpected vector
spoofing attack
Servers
replay attack
registered biometric information
Public key
privileged entity
network services
list attack
IrisCode
ID-password-based authentication
analogue biometric information
feature vector
encryption
decryption key
Cryptography
competitive code
cancelable biometric authentication scheme
biometrics (access control)
biometric information
binary coding
authorisation
authentication
« first
‹ previous
1
2