Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key agreement
biblio
An Efficient Key Agreement Protocol for Smart Grid communication
Submitted by grigby1 on Fri, 01/20/2023 - 4:59pm
pubcrawl
Metrics
Resiliency
privacy
Protocols
Smart Grid
smart meters
Smart Grids
energy consumption
Resists
key agreement
Elliptic curve cryptography
Lead
service provider
smart meter
Smart Grid Privacy
biblio
An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
Submitted by grigby1 on Fri, 07/29/2022 - 9:04am
Smart Grid
power grid vulnerability analysis
session key
trusted authority
key agreement
secure communication
Metrics
Smart Grids
Wireless communication
smart meters
tools
Protocols
authentication
Scalability
Resiliency
resilience
pubcrawl
security
privacy
biblio
A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
Submitted by grigby1 on Fri, 05/06/2022 - 10:32am
resilience
secure authentication
key agreement
DNA cryptography
smart cards
mutual authentication
DNA
Mathematics
parallel processing
pubcrawl
Metrics
encoding
Protocols
privacy
authentication
Resiliency
Human behavior
biblio
Certificateless Peer-to-Peer Key Agreement Protocol for the Perception Layer of Internet of Things
Submitted by grigby1 on Tue, 02/22/2022 - 1:24pm
Protocols
Trusted Computing
sensors
Scalability
Resiliency
resilience
Reliability engineering
Public key
pubcrawl
peer to peer security
performance evaluation
peer-to-peer security
Metrics
key agreement
Human Factors
Costs
combine public key
certificateless
biblio
A new mutual authentication and key agreement protocol in wireless body area network
Submitted by grigby1 on Thu, 05/13/2021 - 12:10pm
anonymous messaging
authentication
Biomedical monitoring
body area networks
Cryptography
key agreement
mutual authentication
Protocols
pubcrawl
resilience
Resiliency
security
WBAN
Wireless communication
wireless sensor networks
biblio
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
probability
information theoretic security
unconditional security
symmetric-key encryption
Shannon's perfect secrecy
security quantities
security formalizations
relaxed perfect secrecy
perfect secrecy
information-theoretic indistinguishability
Information-Theoretic Cryptography
composable security
semantic security
Indistinguishability
Semantics
Scalability
key agreement
information-theoretic security
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
secret keys
private key cryptography
encryption
biblio
Augmented Randomness for Secure Key Agreement using Physiological Signals
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
Scalability
Metrics
physiological signals
physiology
predecessor SKA-PS protocol
Protocols
pubcrawl
quantisation (signal)
resilience
Resiliency
medical signal processing
secure cryptographic key generation
secure key agreement
security
set reconciliation mechanism
SKA-PSAR system
telecommunication security
wearable biosensors
Wireless communication
cryptographic key generation
Augmented Randomness
BANs
Bio-cryptography
BIOS
biosensors
body area networks
Communication system security
correct key generation rate
random key generation
Cryptographic Protocols
Cryptography
false key generation rate
generated keys
highly random cryptographic keys
Human behavior
key agreement
lightweight security mechanisms
biblio
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Submitted by grigby1 on Tue, 03/09/2021 - 3:02pm
pubcrawl
IoTs-Cloud
key agreement
local binary pattern
LSB
message authentication
Metrics
one-time bio-key
one-time message-image document code
one-time random pixel sequence
IoT-cloud
Receivers
resilience
Resiliency
robust message anonymity
Scalability
security
Security analysis
smart devices
Watermarking
document image processing
Bio- MAC
bio-authentication scheme
bio-key management
biometrics (access control)
BIOS
Cloud Computing
Cryptography
data integrity
disappearing authentication code
authentication
documents protection
E2E S2S
feature extraction
handwritten character recognition
handwritten feature extraction
Handwritten Signature
HMAC-SHA-256
Human behavior
Internet of Things
biblio
Fuzzy Extractor-Based Key Agreement for Internet of Things
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
secure authentication
Fuzzy Cryptography
transmission data
Reed Solomon codes
recognition rate results
key agreement
IoT actors
fuzzy vault principle
fuzzy extractor-based key agreement
effective key agreement scheme
computation times
Biometric cryptosystem
Hamming codes
fuzzy extractor
Scalability
data exchange
Reed-Solomon codes
biometrics (access control)
sensors
public key cryptography
fuzzy set theory
authentication
Metrics
pubcrawl
Resiliency
feature extraction
Internet of Things
Cryptography
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
1
2
next ›
last »