Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
symmetric key encryption
biblio
Known Plaintext Attacks on the Omar and abed Homomorphic Encryption Scheme
Submitted by grigby1 on Fri, 08/11/2023 - 11:32am
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
Scalability
information and communication technology
convergence
Security analysis
Toy manufacturing industry
Homomorphic encryption
known plaintext attacks
noise-free
symmetric key encryption
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
pseudonyms
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
computational overhead
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
security
VANET
public key cryptography
attacks
authentication
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
Cryptography
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks
biblio
BigCrypt for Big Data Encryption
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
Pretty Good Privacy technique
zero tolerance security
symmetric key encryption
storage management
Software
Servers
RSA
Rijndael
Resiliency
resilience
Receivers
Public key
pubcrawl
probability
probabilistic approach
private information
Asymmetric Encryption
Metrics
Human behavior
Hadoop
Hacking
encryption
Data protection
Cryptography
Compositionality
cloud storage
Cloud Computing
BigCrypt
big data encryption
Big Data
asymmetric encryption technique