Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
protocol
biblio
Research of Secure Communication of Esp32 IoT Embedded System to.NET Core Cloud Structure Using MQTTS SSL/TLS
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
JSON type data format
TLS/SSL
Temperature sensors
SSL/TLS certificate
SSL Trust Models
secure communication
Scalability
Resiliency
resilience
pubcrawl
Protocols
protocol
MQTTS protocol
MQTTS
microprocessor chips
Metrics
.NET core cloud structure
IoT device
IoT Cloud
IoT
Internet of Things
humidity sensors
Human Factors
Human behavior
Esp32 Wrover
Esp32 IoT embedded system
encrypted communication
embedded systems
Embedded System
Cryptography
Cloud Computing
cloud
biblio
Analytical Study on Mobile Ad Hoc Networks for IPV6
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
Mobile impromptu systems
wireless gadget connections
Wireless communication
transport protocols
telecommunication traffic
Technological innovation
TCP-IP
steering conventions
self arranging system
Resiliency
resilience
pubcrawl
protocol
policy-based governance
pervasive computing
Base stations
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
IPV6 systems
ipv6 security
IPv6 MANET
IPv4 MANET
IP networks
Handheld computers
computer network security
composability
Communication system security
collaboration
biblio
A Cryptographic Look at Multi-party Channels
Submitted by aekwall on Mon, 09/23/2019 - 10:26am
multiparty channels
broadcast channels
broadcast communication
channel security
confidential communication
cryptographic channels
FSE17-ToSC17
full-fledged broadcast channel
game-based authenticity
Group communication
bidirectional communication
point-to-point link
point-to-point links
protocol
secure-channels
Security Properties
standard cryptographic primitives
unidirectional links
Compositionality
Reliability
Servers
encryption
Cryptographic Protocols
Protocols
provable security
Resiliency
pubcrawl
internet
computer network security
Predictive Metrics
-broadcast-communication
-causality-preservation
-confidentiality
-integrity
authenticated communication
authenticated encryption
bidirectional channel
biblio
A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Protocols
threshold cryptography
threshold
telecommunication security
Servers
security protocols
security of data
securities issues
RSA cryptography
RSA
Resiliency
public key cryptography
pubcrawl
authentication
protocol models
protocol
Metrics
Kerberos authentication protocol
Kerberos
Human behavior
high security
Elliptic curve cryptography
ECC
Cryptographic Protocols
Cloud Security
Cloud Computing
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Resiliency
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
mobile ad hoc networks
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
AODV
Metrics
MANET
IDS
high destination sequence number
destination nodes
delays
data packets
cross checking
Conferences
Compositionality
clustering
byzantine attacks
Blackhole
black-hole attack mitigation techniques
attack mitigation
biblio
Specification, Design, and Verification of an Accountability-aware Surveillance Protocol
Submitted by grigby1 on Mon, 06/11/2018 - 3:40pm
accountability
composability
formal verification
Metrics
network accountability
privacy
protocol
pubcrawl
resilience
Resiliency
biblio
Continuous Biometric Verification for Non-Repudiation of Remote Services
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
security
pubcrawl
Resiliency
Human behavior
authentication
composability
protocol
resilience
Metrics
human factor
biometrics
biometric signature
Continuous Authentication
non-repudiation
Repudiation
biblio
Optimized event notification in CAN through in-frame replies and Bloom filters
Submitted by el_wehby on Mon, 05/14/2018 - 2:27pm
event-driven systems
timing
real-time systems
protocol
Proposals
Payloads
optimized event notification
Media Access Protocol
in-frame replies
access protocols
Electronic mail
distributed medium access control mechanism
data structures
controller area networks
CAN XR
Bloom filters
asynchronous medium access control mechanism
1646317
biblio
Attack scenarios and security analysis of MQTT communication protocol in IoT system
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
MQTT implementation
Things devices
telecommunication security
Security by Default
Security analysis
scenario
Scalability
Resiliency
pubcrawl
Protocols
protocol
Ports (Computers)
Payloads
MQTT system
MQTT protocol
adequate security mechanism
MQTT communication protocol
MQTT
ISO
IoT system
IoT device
IoT developers
Internet of Things
data privacy
Cryptography
computer network security
communication protocols
authentication
attack
biblio
SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Protocols
smartphone
smart sensor configuration
Smart Sensor
Smart Home
smart factory
security controller
security
SECURECONFIG
SC
Resiliency
radiofrequency identification
QR-Code
QR codes
pubcrawl
arbitrary configuration data
protocol
NFC code
Near Field Communication
Mobile handsets
Internet of Things
internet
Intelligent sensors
Hardware
dedicated security controller
cyber physical systems
Cryptography
Context
configuration
« first
‹ previous
1
2
3
4
next ›
last »