Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key agreement protocol
biblio
Anonymous Authentication and Key Agreement Protocol for LTE Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:20pm
key agreement protocol
standard TS
specific base station
signature
Scalability
Resiliency
resilience
pubcrawl
pseudorandom permutation
pseudo IMSI
Protocols
mobile terminal
message authentication
LTE networks
Long Term Evolution
3G mobile communication
internet
International Mobile Subscriber Identity
high-speed wireless communication standard
fake stations
Cryptographic Protocols
communication standard
authentication processes
authentication and key agreement protocol
authentication
authenticated scheme suitable
anonymous messaging
anonymous authentication
anonymous
3GPP
biblio
A New Three Party Authenticated Key Agreement Protocol Which Is Defiant towards Password Guessing Attack
Submitted by grigby1 on Mon, 03/02/2020 - 12:32pm
Servers
Password authentication
Password Guessing Attacks
password related attacks
private key cryptography
protocol vulnerable
Protocols
pubcrawl
Scalability
password
side channel attacks
Smart card
smart cards
Tamper resistance
tampered resistance property
telecommunication security
transaction secret values
accurate guess
off-line password guessing attack
new three party authenticated key agreement protocol
Metrics
message authentication
lost smart card
key agreement protocol
insecure channel
Human Factors
Human behavior
encryption
Cryptographic Protocols
cryptographic key agreement protocol
common session secret key
Bio-Hash
authentication
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices
Submitted by grigby1 on Mon, 01/21/2019 - 11:28am
private key cryptography
Internet of Things
key agreement
key agreement protocol
low key generation rate
Mobile handsets
Nexus 5X
Nexus 6P
physical response interval
pre-built fingerprint database
Human behavior
pubcrawl
redundancy time cancellation
Resiliency
secure key agreement
security
smart phones
symmetric key
telecommunication security
composability
acoustic communication
Acoustic Fingerprints
Acoustics
authentication
bidirectional initial authentication
coding scheme
commercial mobile devices
commodity mobile devices
commodity smartphones
acoustic channel response
Cryptographic Protocols
device authentication
Device-to-device communication
encoding
fast device authentication
fast signal detection
GeneWave
Hardware
biblio
"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)"
Submitted by grigby1 on Thu, 02/23/2017 - 11:12am
mobile computing
wireless network technology
security of data
Repudiation
replay attack
pubcrawl170105
Protocols
privacy protection
privacy
mobile payment protocol
Mobile handsets
mobile devices
client centric model
Mobile communication
key agreement protocol
golden mobile pay center protocol
Golden Circle
GMPCP
GC
financial management
cyber security
Cryptography
Complexity theory