Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

network security field

biblio

Visible to the public Security weakness of a lattice-based key exchange protocol

Submitted by aekwall on Mon, 08/26/2019 - 10:07am
  • Protocols
  • Metrics
  • MITM Attack
  • network security field
  • nonDH type key exchange protocol
  • NTRU-ENCRYPT
  • NTRU-KE
  • NTRU-SIGN
  • policy-based governance
  • private key cryptography
  • man-in-the-middle attack
  • pubcrawl
  • public key cryptography
  • quantum attacks
  • quantum computing
  • resilience
  • Resists
  • Secret key
  • security weaknesses
  • telecommunication security
  • Human behavior
  • Computing Technology
  • cryptanalysis
  • Cryptographic Protocols
  • DH problem
  • DH-HEMTs
  • Diffie-Hellman problem
  • digital signatures
  • exponential attacks
  • grid computing
  • authentication mechanism
  • information field
  • information technology
  • Key exchange
  • lattice cryptography
  • lattice-based key exchange protocol
  • Lattices
  • Lei
  • Liao
biblio

Visible to the public Research on modeling for network security policy confliction based on network topology

Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
  • network topology
  • telecommunication security
  • telecommunication network topology
  • security policy model
  • security policies
  • security
  • Routing
  • pubcrawl
  • Protocols
  • Policy consistency
  • Peer-to-peer computing
  • campus network
  • network security policy confliction
  • network security field
  • network modeling
  • network devices
  • IP networks
  • graph theory
  • distributed network system
  • Conflict checking
  • Communication networks

Terms of Use  |  ©2023. CPS-VO