Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Repudiation
biblio
Non-Repudiation and End-to-End Security for Electric-Vehicle Charging
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
composability
cryptographic solution
Cryptography
electric vehicle charging
electric-vehicle-charging ecosystem
GDPR
Human behavior
long-term nonrepudiation end-to-end security
Merkle authentication trees
Metrics
Netherlands
pubcrawl
Repudiation
Resiliency
trees (mathematics)
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
biblio
LibSEAL: Revealing Service Integrity Violations Using Trusted Execution
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
composability
Human behavior
Metrics
pubcrawl
Repudiation
resilience
Resiliency
biblio
Security and Device Control Method for Fog Computer Using Blockchain
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
blockchain
Data Security
Fog computing
Fog Computing and Security
Hash Function
Internet of Things
composability
Human behavior
Metrics
pubcrawl
Repudiation
resilience
Resiliency
Scalability
biblio
The Quality Control in Crowdsensing Based on Twice Consensuses of Blockchain
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
blockchain
composability
Consensus
Crowdsensing
Human behavior
Metrics
pubcrawl
Quality Control
Repudiation
resilience
Resiliency
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
source nonrepudiation
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
malicious viruses
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
authentication
live VM migration
live migration
Human behavior
enhanced secure mechanism
DDoS Attacks
data integrity
data confidentiality
computer viruses
Computational modeling
composability
Cloud federations
Cloud Computing
AVISPA tool
authorization
authorisation
biblio
Prominence Of ECDSA Over RSA Digital Signature Algorithm
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
Human behavior
RSA Digital Signature Algorithm
RSA
Resiliency
resilience
Repudiation
public key cryptography
public key cryptographic algorithms
pubcrawl
non-repudiation
Metrics
composability
handwriting recognition
Elliptical Curve Digital Signature Algorithm
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDLP
ECC
digital signatures
cryptosystem
Conferences
biblio
Using Keystroke Authentication Typing Errors Pattern as Non-Repudiation in Computing Forensics
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
biometric
composability
computer security
Forensics
Human behavior
keystroke
Metrics
Pattern recognition
pubcrawl
Repudiation
resilience
Resiliency
user authentication
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
« first
‹ previous
1
2
3
4
5
6
next ›
last »