Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
symmetric key
biblio
GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
private key cryptography
Internet of Things
key agreement
key agreement protocol
low key generation rate
Mobile handsets
Nexus 5X
Nexus 6P
physical response interval
pre-built fingerprint database
Human behavior
pubcrawl
redundancy time cancellation
Resiliency
secure key agreement
security
smart phones
symmetric key
telecommunication security
composability
acoustic communication
Acoustic Fingerprints
Acoustics
authentication
bidirectional initial authentication
coding scheme
commercial mobile devices
commodity mobile devices
commodity smartphones
acoustic channel response
Cryptographic Protocols
device authentication
Device-to-device communication
encoding
fast device authentication
fast signal detection
GeneWave
Hardware
biblio
Implementation of SERPENT cryptographic algorithm for secured data transmission
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
key management
Technological innovation
symmetric key
substitution permutation network
SERPENT cryptographic algorithm
SERPENT
secured data transmission
s-box stage
round function
Resiliency
resilience
Repudiation
pubcrawl
Metrics
linear mixing stage
key scheduling
Algorithm design and analysis
IP networks
human factor
Human behavior
graphical programming tool
encryption
enciphering process
decryption
deciphering process
Data Security
data integrity
Cryptography
composability
Ciphers
Blockcipher
biblio
Garbling Gadgets for Boolean and Arithmetic Circuits
Submitted by grigby1 on Wed, 05/17/2017 - 1:53pm
circuits
Cryptography
exponentiation
garbled circuits
pubcrawl
Resiliency
secure multi-party computation
symmetric key
biblio
Key Management for Cloud Data Storage: Methods and Comparisons
Submitted by BrandonB on Wed, 05/06/2015 - 1:40pm
Memory
symmetric key cryptography algorithms
symmetric key
storage management
Servers
sensitive information protection
Public key
public cloud
potential intruders
outsourced cloud
Organizations
onsite cloud
applications
key management
encryption key management
decryption key management
Data Security
Cryptography
Communities
cloud service provider
cloud scenarios
cloud data storage
cloud computing paradigm
Cloud Computing