Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DH-HEMTs
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
IKE protocol
word length 128 bit
Synchronization
security association attack
securing communications
SA
Protocols
network protocol
network communication domain
man in the middle attack
keys phase exchange
IPSec protocol
IPsec
Internet key exchange protocol
internet
chaotic cryptography
IKE
FPGA implementation
FPGA
field programmable gate arrays
DH-HEMTs
data phase transfer
Cryptography
Cryptographic Protocols
computer network security
chaotic cryptosystem solution
chaotic cryptosystem
chaotic communication
4-dimension chaotic system
pubcrawl
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
Internet key exchange protocol
IPsec
4-dimension chaotic system
chaotic cryptosystem
chaotic cryptosystem solution
data phase transfer
FPGA implementation
IKE
IKE protocol
securing communications
keys phase exchange
man in the middle attack
network communication domain
network protocol
SA
security association attack
word length 128 bit
computer network security
IPSec protocol
chaotic cryptography
chaotic communication
Predictive Metrics
DH-HEMTs
internet
Cryptography
Synchronization
composability
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
FPGA
field programmable gate arrays
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Resiliency
Tor browser forensics
Relays
perpetrators
onion routing
onion router
invisible evidence
Internet crimes
information security offenses
information security incidents
incognito
Facebook
endeavors
digital evidence
DH-HEMTs
internet
Tor
Digital Forensics
Compositionality
Browser Security
online front-ends
Computer crime
Forensics
Cryptography
Browsers
Metrics
Human behavior
pubcrawl
resilience
tools
biblio
A New Key Exchange Algorithm over a VLC Indoor Channel
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Neural Synchronization
VLC indoor channel
VLC
Visible Light Communications Security
visible light communication indoor channel
tree parity machine synchronization
Synchronization
synchronisation
stimulus vector
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
neuronal synchronization
average synchronization time t_sync
Metrics
key exchange algorithm
indoor communication
hyperelliptic curves
GF(2n)
Galois fields
Galois field
free-space optical communication
Diffie-Hellman protocol
DH-HEMTs
cryptosystem security
Cryptography
Cryptographic Protocols
Biological neural networks
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
A Framework for Universally Composable Diffie-Hellman Key Exchange
Submitted by grigby1 on Tue, 02/27/2018 - 2:34pm
key exchange protocols
universal composability
standards
SIGMA
security of data
reduction proofs
pubcrawl
Protocol Security
protocols building
Protocols
OPTLS
composability
ISO 9798-3
IITM model
encryption
Diffie-Hellman key exchange
DH key exchange
DH-HEMTs
Cryptographic Protocols
cryptographic primitives
Computational modeling
biblio
Application of Deep Learning Technique for Automatic Data Exchange with Air-Gapped Systems and Its Security Concerns
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
DHT11 sensor
security
Resiliency
resilience
pubcrawl
Metrics
Internet of Things
Humidity
Human Factors
Human behavior
Air gaps
DH-HEMTs
deep learning
data exchange
Conferences
computer security
composability
Arduino board
Air-Gapped Systems
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
TPM-supported key agreement protocols for increased autonomy in constellation of spacecrafts
Submitted by grigby1 on Mon, 11/13/2017 - 12:00pm
pubcrawl
TT&c
trusted platform modules
Trusted Platform Module
TPM-supported key agreement protocols
spacecrafts
Space vehicles
space missions
space communication links
security mechanisms
Resiliency
composability
Protocols
protocol iterations
payload links
opportunistic control center
Jamming
encryption
DH-HEMTs
Cryptographic Protocols
cryptographic keys