Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key infrastructures
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 9:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
Secure Composition of PKIs with Public Key Protocols
Submitted by K_Hooper on Wed, 02/28/2018 - 10:32am
Public key
tools
telecommunication security
tagging
symbolic model
symbolic formal models
secure composition
public key protocols
public key infrastructures
public key cryptography
Composition
pubcrawl
Protocols
PKI
formal method
encryption
Cryptographic Protocols
Computational modeling
Compositionality
biblio
Advanced Methodologies to Deter Internal Attacks in PTP Time Synchronization Networks
Submitted by grigby1 on Tue, 02/06/2018 - 12:59pm
network infrastructures
trusted platform modules
time synchronization supervisors
time synchronization
Synchronization
synchronisation
security
Resiliency
public key infrastructures
public key cryptography
pubcrawl
PTP time synchronization networks
Protocols
precision time protocol
network intrusion detection systems
accurate time synchronization
microsecond level
IP networks
internal attacks
industrial environments
device time synchronization
delays
cyber-attacks
Cyber Attacks
Cryptography
computer network security
computer network
composability
Clocks