Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intermediate node
biblio
Secure DSR Routing from Malicious Node by PGP Encryption
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
Routing protocols
pubcrawl
Public key
resilience
Resiliency
Route cache
route reply control messages
route request
Routing
PGP
RREP
RREP control message
RREQ
RREQ control message
secure DSR Routing
telecommunication security
UIV
weather RREP
malicious node
Cryptography
data transmission source
demand wireless communication
destination source
Dsr
dynamic source routing
encryption
intermediate node
Compositionality
MANET
manet privacy
MANET reactive routing protocol
Metrics
mobile ad hoc network
mobile ad hoc networks
neighbor nodes
Peer-to-peer computing
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
Chaining trusted links by deploying secured physical identities
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
pubcrawl
unclonable physical tokens
Trust management
trusted links
trusted link
Trust Chaining by Physical Tokens
smart devices
security of data
security chain
secured physical identities
Secret Unkown Cipher
secret unknown ciphers
Scalability
Resiliency
authentication
Protocols
physical clone-resistant identities
Object recognition
Internet of Things
intermediate node
Identity management
Human behavior
generic node authentication protocols
Cryptography
Cryptographic Protocols
clone-resistant physical identity
Ciphers