Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secret keys
biblio
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Submitted by aekwall on Thu, 04/08/2021 - 3:39pm
probability
information theoretic security
unconditional security
symmetric-key encryption
Shannon's perfect secrecy
security quantities
security formalizations
relaxed perfect secrecy
perfect secrecy
information-theoretic indistinguishability
Information-Theoretic Cryptography
composable security
semantic security
Indistinguishability
Semantics
Scalability
key agreement
information-theoretic security
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
secret keys
private key cryptography
encryption
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
Resilient Security Architectures
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Internet of Things
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
communication entities
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
3GPP
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism
biblio
A Comprehensive Security System for Digital Microfluidic Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 12:36pm
private key cryptography
intellectual property security
invasive software
IP piracy
Lab-on-a-Chip
malicious attackers
Microfluidics
Pins
policy-based governance
intellectual property piracy
pubcrawl
resilience
Resiliency
secret keys
security
trojan
Trojan attacks
Trojan horses
comprehensive security system
authentication mechanism
bioassay completion time
biochips market
biology computing
bioMEMS
Cameras
CCD cameras
composability
authentication
Computer crime
defense mechanisms
Digital Microfluidic Biochips
Digital Microfluidics
DMFBs
Electrodes
Foundries
industrial property
biblio
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
Submitted by aekwall on Mon, 10/19/2020 - 11:07am
compromised machine
KP-ABE
Key Policy Attribute Based Encryption (KP-ABE)
Stephen-Davidowitz
nontrivial combining nonmonotonic formula
nonmonotonic access structure
non-monotonic access structure
multiauthority nonmonotonic KP-ABE scheme
multiauthority key-policy ABE scheme
multiauthority ABE scheme
Multi-authority
MA-KP-ABE-CRF system
ex-filtration
cryptographic reverse firewall concept
cryptographic reverse firewall
CRF security protection
firewalls
Charm library
attribute-based encryption field
attribute-based encryption
formal security analysis
Resists
Firewalls (computing)
pubcrawl
Resiliency
Protocols
secret keys
Access Control
encryption
Cryptography
Scalability
biblio
Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Submitted by grigby1 on Tue, 06/02/2020 - 10:54am
source coding
pubcrawl
public channel
public key cryptography
Relays
resilience
Resiliency
Scalability
secret keys
security
policy-based governance
source coding scheme
source sequences
source-type model
telecommunication security
Telecommunications
trusted helper
untrusted helper
Upper bound
Indexes
cooperative communication
cooperative key generation
cooperative two-key generation
Decoding
discrete memoryless sources
five-terminal system
generated keys
Human behavior
Human Factors
channel capacity
information theoretic security
information-theoretic security
key capacity region
key leakage rate
Metrics
partial-trusted helpers
passive eavesdropper
physical layer security
biblio
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
Submitted by aekwall on Mon, 03/23/2020 - 12:21pm
PUF
random key generation
SRAM PUF
SRAM device
SRAM chips
SRAM chip
SRAM
PUF key generation mechanism
Private keys
fuzzy extractors
fuzzy extractor techniques
error correction coding methods
Error analysis
Arduino mega shield
adjustable memory-based PUF
key generation
IoT
error correction codes
physically unclonable functions
Random access memory
authentication
Metrics
pubcrawl
Human behavior
Resiliency
secret keys
private key cryptography
IoT devices
Internet of Things
encryption
Servers
Scalability
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:01am
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
biblio
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys
Submitted by aekwall on Mon, 01/20/2020 - 10:59am
low-end control units
telecommunication security
security issues
secret keys
Scalability
robots
robotic applications
Resiliency
pubcrawl
private key cryptography
network security
mobile robots
message authentication
automobiles
lightweight cryptography
Lightweight Ciphers
Lightweight Cipher
lightweight authentication
hardware based individual keys
Hardware
firmware
Ciphers
Autonomous Driving
Automotive engineering
Automotive Device Authentication
automotive applications
biblio
Phase Jamming Attack: A Practical Attack on Physical Layer-Based Key Derivation
Submitted by grigby1 on Wed, 11/27/2019 - 2:01pm
physical layer security
Wireless communication
Signal to noise ratio
security enhancement performance
security
secret keys
secret key generation
Resiliency
resilience
received signal phase quantisation
Quantization (signal)
pubcrawl
probability
physical-layer security
physical layer-based key derivation procedure
adversary signal transmission
Physical layer
phase quantization regions
phase jamming attack
phase attack
Metrics
key generation technique
jamming attack
Jamming
Cryptography
composability
Communication system security
communication management
communication channel networks
biblio
Cryptographic and Non-Cryptographic Network Applications and Their Optical Implementations
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
optical implementations
theoretical cryptography
signal processing
secret keys
quantum version
quantum theory
quantum optics
quantum optical versions
Quantum mechanics
quantum mechanical signals
quantum key distribution protocols
quantum advantage
prominent examples
Optical pulses
pubcrawl
noncryptographic network applications
mere conceptual value
Communication Systems
classical signal structures
abstract protocols
quantum cryptography
quantum computing
Optical fiber networks
Optical detectors
Compositionality
Fingerprint recognition
Protocols
composability
1
2
next ›
last »