Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
protocol
biblio
On the Security of Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System
Submitted by grigby1 on Fri, 09/16/2022 - 3:39pm
Internet of Things
Cloud Computing
security
pubcrawl
resilience
Scalability
Medical services
Protocols
Fog computing
wireless networks
protocol
Resiliency
authentication protocol
security protocol
biblio
Analysis of information security in the PoW (Proof of Work) and PoS (Proof of Stake)blockchain protocols as an alternative for handling confidential nformation in the public finance ecuadorian sector
Submitted by grigby1 on Wed, 06/15/2022 - 9:57am
information security
blockchain
pubcrawl
Human behavior
Scalability
bitcoin
distributed ledger
protocol
legislation
PoS
PoW
Proof of Work
Public finance
bitcoin security
biblio
Data Obfuscation Technique in Cloud Security
Submitted by grigby1 on Mon, 04/18/2022 - 10:37am
cloud computing security
Cloud Security
cloud service providers
cloud storage
Data models
Data Security
Memory
MONcrypt
obfuscation
outsourcing
protocol
Protocols
pubcrawl
Scalability
security scalability
biblio
Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 11:20am
Ad Hoc Network Security
Ad hoc networks
authentication protocol
Compositionality
Intelligent Transportation Systems
Internet of Things
Metrics
protocol
Protocols
pubcrawl
resilience
Resiliency
security
security protocol
sensors
biblio
An Enhanced and Secure Multiserver-based User Authentication Protocol
Submitted by aekwall on Tue, 10/12/2021 - 2:07pm
composability
protocol verification
smart cards
protocol
Multiserver
ProVerif
cryptanalysis
policy-based governance
Compositionality
security
pubcrawl
Protocols
authentication
Servers
privacy
password
Cryptography
biblio
Research of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 10:57am
Metrics
XMPP IoT communication protocols
XMPP
transport protocols
Software
security
Resiliency
resilience
pubcrawl
Protocols
protocol
Power demand
popular IoT protocols
MQTT
advantage
IoT protocol
IoT
Internet of Things
HTTP
hardware stage
Hardware
Esp32
embedded systems
Embedded System
different IoT protocols
composability
CoAP
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
radar detection
Resistance
controller area networks
automotive networks
broadcast medium
CAN radar networks
Distance measurement
Impedance measurement
malicious message transmission
Transmission line measurements
radar receivers
Resistors
sensing unit
TDR technique
time domain reflectometry technique
time-domain reflectometry
transceivers
vehicle network
sensors
IDS
Internet of Things
cyber-physical systems
Resiliency
pubcrawl
Anomaly Detection
security vulnerabilities
security mechanisms
Intrusion Detection
Intrusion Detection Systems
protocol
automotive security
controller area network
controller area network security
Impedance
power transmission lines
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
cryptographic algorithms
reviewed protocols
Resistance
relatively old Lamport's hash-chain protocol
one-time passwords
one-time password
information technologies
e-commerce
complicated protocols
two factor authentication
two-factor authentication
Authentication Protocols
electronic commerce
Servers
protocol
Human Factors
Phishing
Fingerprint recognition
authentication
message authentication
Vulnerability
Cryptography
pubcrawl
information security
Cryptographic Protocols
biblio
Features of Application of Data Transmission Protocols in Wireless Networks of Sensors
Submitted by aekwall on Mon, 02/17/2020 - 1:35pm
internetworking
secure IoT-solution mechanisms
radiotelemetry
publisher-subscriber architecture
protecting devices
network servers
messages
Message Queue Telemetry Transport protocol
gateways
device authentication protection
data transmission protocols
certificate-based authentication
data
queueing theory
sensor networks
protocol
computer network security
sensors
sensor security
authentication
internet
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
transport protocols
Software
Protocols
Internet of Things
1
2
3
4
next ›
last »