Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

resource constrained environments

biblio

Visible to the public White-Box Cryptography Based Data Encryption-Decryption Scheme for IoT Environment

Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
  • IoT environment
  • white-box cryptography based data encryption-decryption scheme
  • white-box cryptography
  • White Box Security
  • white box cryptography
  • transportation monitoring
  • symmetric encryptions algorithms
  • resource constrained environments
  • Resiliency
  • resilience
  • pubcrawl
  • pedestrian levels
  • Metrics
  • medical devices
  • Matrix decomposition
  • manufacturing process
  • advanced encryption standard
  • IoT devices
  • Internet of Things
  • infusion pumps
  • implanted devices
  • encryption
  • encoding
  • differential attacks
  • Cryptography
  • computer network security
  • composability
  • code lifting attacks
  • Ciphers
  • cipher block chaining mode
  • CBC mode.
  • Block Cipher
biblio

Visible to the public Secure authentication on the Internet of Things

Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
  • lightweight cryptographic algorithms
  • user credential protection
  • universal access
  • Servers
  • resource constrained environments
  • Resiliency
  • resilience
  • pubcrawl
  • Protocols
  • Phishing
  • mutual multifactor authentication
  • multifactor authentication
  • Metrics
  • memory requirements
  • man-in-the-middle attacks
  • authentication
  • Internet of Things
  • Human Factors
  • human factor
  • Human behavior
  • Cryptography
  • Cryptographic Protocols
  • confidential communications
  • Computer crime
  • code size
  • Ciphers
  • biometrics (access control)
  • biometrics
  • biometric-based cryptographic techniques
  • biometric authenticated key exchange protocol

Terms of Use  |  ©2023. CPS-VO