Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
HMAC
biblio
Secure Communication between Arduinos using Controller Area Network(CAN) Bus
Submitted by grigby1 on Fri, 05/12/2023 - 9:12am
Human Factors
SPI
security
Resiliency
resilience
renewable energy sources
pubcrawl
Protocols
internet
CAN
Human behavior
HMAC
Focusing
ECU
cyberattack
Costs
controller area network
biblio
Proposal of HMAC based Protocol for Message Authenication in Kerberos Authentication Protocol
Submitted by grigby1 on Fri, 03/03/2023 - 4:16pm
telecommunication traffic
kerberos security
symmetric cryptography
Key Distribution System
codes
unauthorized access
HMAC
Electronic mail
Public key
Servers
Protocols
authentication
message authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Proposed Security Measures for Code Injection for CubeSats
Submitted by aekwall on Fri, 02/17/2023 - 9:49am
security
Human Factors
authentication
Protocols
pubcrawl
Metrics
Resiliency
policy-based governance
malware
Satellites
codes
passwords
CubeSat and satellite
HMAC
Safe Code Injection
Safe Coding
biblio
Multiple layered Security using combination of Cryptography with Rotational, Flipping Steganography and Message Authentication
Submitted by grigby1 on Fri, 02/03/2023 - 3:58pm
HMAC
Rotational LSB Steganography
Histogram Comparative Analysis
Flipping LSB Steganography
steganography detection
codes
data science
Steganography
Image coding
encryption
Histograms
encoding
composability
Cryptography
privacy
AES
Metrics
pubcrawl
biblio
Framework for Data Security Using DNA Cryptography and HMAC Technique in Cloud Computing
Submitted by grigby1 on Fri, 04/01/2022 - 12:17pm
DNA cryptography
Third Party Auditor (TPA)
Secure File Sharing
Resiliency
resilience
pubcrawl
privacy
Metrics
Human behavior
HMAC
Cloud Computing
DNA
data transfer
Data Security
Cryptography
computer architecture
composability
Communication Systems
codes
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 12:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
Remote Attestation based Software Integrity of IoT devices
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
neural style transfer
trusted solution
trusted platform modules
Trusted Computing
tpm
telecommunication security
software trusted platform module
software integrity
security issues
Scalability
Resiliency
reasonable computational power
pubcrawl
Predictive Metrics
antivirus
message authentication
IoT devices
IoT
Internet of Things
HMAC values
HMAC
hashed message authentication code
cyber-physical system security
Cryptography
Cryptographic Protocols
cryptographic operations
composability
biblio
Implementation of Lightweight Stream Cipher in AODV Routing Protocol for MANET
Submitted by grigby1 on Mon, 06/01/2020 - 2:59pm
AODV
Blackhole attack
computer science
encryption
HMAC
lightweight stream cipher
MANET
mobile ad hoc networks
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
Trivium
biblio
Performance evaluation of an authentication mechanism in time-triggered networked control systems
Submitted by willirn1 on Fri, 05/31/2019 - 10:18am
networked control systems
Vanderbilt
TTEthernet network
TTEthernet
timing behavior
time-triggered networked control systems
Time-Trigger Architectures
time triggered architectures
Synchronization
Switches
security mechanisms
Secure Messages
safety property
reliability property
Receivers
performance evaluation
System-security co-design
network data communication
message integrity
message confidentiality
message authentication
Local area networks
HMAC
hash based message authentication
fault tolerance property
Cryptography
computer network security
computation overhead
communication overhead
authorisation
authentication mechanism
biblio
HMAC based one t #x0131;me password generator
Submitted by BrandonB on Wed, 05/06/2015 - 10:51am
HMAC
standards
Signal processing algorithms
signal processing
Production
One Time Passwords
one time password production methods
one tıme password generator
message authentication
Keccak digest algorithm
Keccak
authentication
hashing-based message authentication code structure
Hash-Based Message Authentication Code
Hash functions
Hash Function
hash algorithm
fixed length strings
electronic media
Cryptography
Conferences