Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confidential messages
biblio
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications
Submitted by grigby1 on Thu, 01/28/2021 - 12:31pm
QR Code (4)
Instant messaging
Instant messaging (1)
instant messaging application security
message decryption process
message security
Metrics
pubcrawl
public key cryptography
implementation designs
QR code implementation
RSA 2048
Scalability
security
Servers
two factor authentication
two-factor authentication
Two-factor authentication (3)
Electronic mail
resilience
Resiliency
account theft
AES 128
android
android encryption
authentication
confidential messages
QR codes
electronic messaging
encryption
end-to-end encryption
Fingerprint (5)
Fingerprint recognition
Human behavior
hybrid encryption
Hybrid Encryption (2)
biblio
Information Flow Control for Distributed Trusted Execution Environments
Submitted by aekwall on Mon, 01/20/2020 - 10:45am
encryption
untrusted host
Trusted Computing
TEE
Resiliency
pubcrawl
Protocols
Predictive Metrics
messages authentication
Libraries
information-flow-control
Information Flow Control
high-level abstractions
high-integrity messages
Fabrics
encryption audits
-distributed-systems
distributed trusted execution environments
distributed programming
DFLATE
data integrity
Cryptography
cryptographic mechanisms
core security calculus
confidential messages
Compositionality
Calculus
-trusted-execution-environment
-security
-language-based-security
-enclaves
biblio
"The two-hop interference untrusted-relay channel with confidential messages"
Submitted by grigby1 on Tue, 02/14/2017 - 12:05pm
pubcrawl
wireless channels
untrusted relay node
two hop interference untrusted relay channel
Trusted Computing
telecommunication security
structured codes
stochastic encoding
security
secure rate region
scaled compute-and-forward
Relays
relay networks (telecommunication)
radiofrequency interference
Science of Security
confidential messages
nested lattice codes
message transmission
message destination
Lattices
Jamming
Interference
Gaussian processes
Gaussian codewords
encryption block
encoding
direct links
Decoding
Cryptography
cooperative jamming