Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
non-repudiation
biblio
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
provable data possession
Metrics
non-repudiation
nonrepudiable PDP scheme
nonrepudiable provable data possession scheme
nonrepudiation issue
outsourced data
private auditability
private verifier
human factor
pubcrawl
Repudiation
resilience
Resiliency
security
Servers
storage management
associated tags
Human behavior
DV-PDP schemes
digital signatures
designated verifier
Data models
Data mining
data integrity
concrete DV-NRPDP scheme
Computational modeling
composability
cloud storage systems
cloud storage server
cloud storage
Cloud Computing
Cascading style sheets
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
biblio
Continuous Biometric Verification for Non-Repudiation of Remote Services
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
security
pubcrawl
Resiliency
Human behavior
authentication
composability
protocol
resilience
Metrics
human factor
biometrics
biometric signature
Continuous Authentication
non-repudiation
Repudiation
biblio
Secure object tracking protocol for Networked RFID Systems
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
security
protocol
Protocols
pubcrawl170112
PUF
radiofrequency identification
radiofrequency identification technology
RFID
secure object tracking protocol
privacy
security protocol description language
SPDL model
supply chains
telecommunication security
tracker
unclonable
visibility
networked RFID system
cryptographic primitive
Cryptographic Protocols
Diffie-Hellman algorithm
distributed system
injection of fake objects
IoT
lawful business operation
Mathematical model
automated claim verification tool Scyther
non-repudiation
NRS
NRS system security
object traceability
object tracking
object visibility
physically unclonable function
biblio
Overview on vehicular ad hoc network and its security issues
Submitted by BrandonB on Wed, 05/06/2015 - 7:52am
telecommunication switching
safekeeping
Safety
security
security issues
self-configurable network connectivity
signal-weakening barrier
telecommunication network routing
telecommunication security
Roads
travel comfort
unauthorized message injection
VANET
vehicles
vehicular ad hoc networks
Vehicular ad-hoc networks (VANET)
vehicular communications
wireless links
eavesdropping
attacks
authentication
Availability
Computer crime
confidentiality
Cryptography
data privacy
data trust
active safety enhancement
information exchange
information transmission
message alteration
message routing
non-repudiation
Position based routing
preventive safety enhancement
privacy
« first
‹ previous
1
2