Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PKI Trust Models
biblio
A Blockchain-based Trust System for the Internet of Things
Submitted by aekwall on Mon, 04/01/2019 - 10:05am
Access Control
blockchain
blockchain security
distributed ledger
Human behavior
IoT
Metrics
PKI Trust Models
pubcrawl
Resiliency
Scalability
security
biblio
A Privacy-Aware PKI System Based on Permissioned Blockchains
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
Permissioned Blockchains
security
Scalability
Resiliency
public-key infrastructure
Public key
pubcrawl
privacy-awareness
PKI Trust Models
authentication
Organizations
Metrics
Human behavior
Digital certificate
contracts
component
blockchain security
blockchain
biblio
Securing Email for the Average Users via a New Architecture
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
Human Factors
Servers
Scalability
Resiliency
Public key
pubcrawl
privacy protection
privacy
PKI Trust Models
PKI
Metrics
internet
communication medium
Human behavior
encryption
email security
Email Protocols
email messages
email encryption
Electronic mail
data privacy
cyber security
Cryptography
consumer
biblio
Malsign: Threat Analysis of Signed and Implicitly Trusted Malicious Code
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
PKCS
trusted software providers
Trusted Computing
threat analysis
targeted attacks
signing keys
signed malware
signed code
Servers
Scalability
Resiliency
pubcrawl
private key cryptography
private key
PKI Trust Models
PKI
benign software
Metrics
malware
Malsign
malicious code signing
invasive software
implicitly trusted malicious code
Human Factors
Human behavior
genuine software
digital signatures
Computer crime
Companies
code signing infrastructure
code signing
Browsers
biblio
Universally Composable RFID Mutual Authentication
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
security notion
public key update protocols
radiofrequency identification
readers corruptions
Resiliency
RFID Authentication
RFID mutual authentication protocols
RFID tags
Scalability
public key infrastructure
tags corruptions
trusted certificates
trusted cryptographic protocols
trusted third parties
universal composability
universally composable framework
zero-knowledge privacy model
adversary model
public key encryption
public key cryptography
Public key
pubcrawl
Protocols
privacy
PKI Trust Models
Metrics
message authentication code
Human Factors
Human behavior
Cryptographic Protocols
cryptographic protocol
authentication
arbitrary environment
biblio
Trust Structure in Public Key Infrastructures
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
pubcrawl
Trusted Computing
trust structure
styling
style
Servers
Semantics
security augmentation
Scalability
Resiliency
public key infrastructure
public key cryptography
Public key
authentication
privacy
PKI Trust Models
PKI
Metrics
intelligent algorithms
insert
Human Factors
Human behavior
generic PKI model
formatting
certification
biblio
A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
certificate-based signatures
Hess's signature scheme
Human behavior
Human Factors
ID-based signature schemes
implicit and explicit certificates-based public key cryptography
Metrics
PKI Trust Models
pubcrawl
Resiliency
Scalability
Security analysis
biblio
PKI Mesh Trust Model Based on Trusted Computing
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
Metrics
Trusted Platform Module
Trusted Computing
trust model
Scalability
Robustness
Resiliency
public-key infrastructure
public key infrastructure
public key cryptography
Public key
pubcrawl
PKI Trust Models
PKI mesh trust model
authentication
Mesh networks
Human Factors
Human behavior
Electric breakdown
computer security
computer science
computational complexity
certification path processing
certification authorities
certification
certificate path processing
Bridges
biblio
A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network Environment
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
Resiliency
wireless communication networks
VSN
vehicular social network environment
vehicular network environment
Vehicular cloud
vehicular ad hoc networks
user identity authentication
Trusted Computing
Trust management
traffic engineering computing
three-layer VSN model
software engineering
social networking (online)
Scalability
authorisation
pubcrawl
PKI Trust Models
performance evaluation
mobile computing
mobile communication networks
Metrics
large-scale data sharing
Internet of Things
Human Factors
Human behavior
cloud-based VSN architecture
cloud-based trust evaluation scheme
Cloud Computing
biblio
SCPKI: A Smart Contract-Based PKI and Identity System
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
Human behavior
Human Factors
Metrics
PKI Trust Models
pubcrawl
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
next ›
last »