Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
Blockchain Technology in Digital Certificate Authentication
Submitted by grigby1 on Thu, 06/29/2023 - 11:03am
pubcrawl
resilience
Resiliency
Scalability
authentication
privacy
Reliability
Permission
Market research
digital signatures
digital signature
education
blockchains
Blockchain Technology (BTC)
E-Certificate
Hash key
biblio
Digital Signature with Message Security Process
Submitted by grigby1 on Thu, 06/29/2023 - 11:02am
encryption
pubcrawl
resilience
Resiliency
Scalability
authentication
digital signature
Reliability
Receivers
decryption
digital signatures
hash
RSA algorithm
electronic commerce
SHA
biblio
Observations on the Theory of Digital Signatures and Cryptographic Hash Functions
Submitted by grigby1 on Thu, 06/29/2023 - 11:02am
non-repudiation
pubcrawl
resilience
Resiliency
Scalability
authentication
Computers
Elliptic curve cryptography
Cryptographic Hash Function
digital signatures
digital signature
malicious
Forgery
integrity
Hash-based
Reliable
biblio
Implementation Security Digital Signature Using Rivest Shamir Adleman (RSA) Algorithm As A Letter Validation And Distribution Validation System
Submitted by grigby1 on Thu, 06/29/2023 - 11:02am
encryption
pubcrawl
resilience
Resiliency
Scalability
authentication
Cryptography
authorization
ISO standards
digital signatures
Distributed databases
digital signature
sustainable development
ISO 9126
Rivest Shamir Adleman (RSA)
biblio
A Survey on the Security in Cyber Physical System with Multi-Factor Authentication
Submitted by grigby1 on Fri, 06/09/2023 - 11:52am
CPS
pubcrawl
Human behavior
authentication
privacy
Cryptography
sensors
cyber-physical systems
Resistance
networked control systems
face recognition
Multi-factor authentication
Costs
Cyber Physical System
Human Factors
multifactor authentication
biblio
Cross-Layer Authentication based on Physical-Layer Signatures for Secure Vehicular Communication
Submitted by grigby1 on Tue, 05/30/2023 - 2:19pm
Cross Layer Security
Physical-Layer Signatures
Cross-Layer Authentication
communication security
Costs
Compositionality
composability
public key infrastructure
Wireless communication
pubcrawl
Computational modeling
Protocols
Cryptography
authentication
Heuristic algorithms
Resiliency
resilience
biblio
SPDT: Secure and Privacy-Preserving Scheme for Digital Twin-based Traffic Control
Submitted by grigby1 on Fri, 05/12/2023 - 9:21am
privacy
Soft sensors
digital twin
Control Theory
Resiliency
traffic control
resilience
Complexity theory
data privacy
Cloud Computing
authentication
Scalability
Safety
Human Factors
Human behavior
pubcrawl
security
biblio
CAN FD Message Authentication Enhances Parallel in-vehicle Applications Security
Submitted by grigby1 on Fri, 05/12/2023 - 9:12am
masquerade attack
Space vehicles
security
Resiliency
resilience
real-time systems
pubcrawl
parallel In-vehicle applications
message authentication
application security
Human Factors
Human behavior
embedded systems
Costs
controller area network
CAN FD
automobile security
authentication
biblio
MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle
Submitted by grigby1 on Fri, 04/28/2023 - 11:49am
non-repudiation
blockchain
pubcrawl
authentication
composability
real-time systems
smart contracts
Reliability
data communication
Data Transmission
Costs
multisignature
Social Internet of Vehicles (SIoV)
biblio
A Novel Password Secure Mechanism using Reformation based Optimized Honey Encryption and Decryption Technique
Submitted by grigby1 on Fri, 04/14/2023 - 3:09pm
Resistance
Reformation-based scheme
Password authentication
optimized honey encryption and decryption
Brutal force attack
passwords
codes
brute force attacks
Force
collaboration
control systems
Protocols
authentication
policy-based governance
Human Factors
Human behavior
pubcrawl
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »