Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
An Efficient and Secure Anonymous Authentication Scheme for V2G Networks
Submitted by grigby1 on Fri, 01/20/2023 - 2:47pm
smart grid consumer privacy
authentication
collaboration
Computer hacking
data privacy
Economics
fault tolerance
Fault tolerant systems
Policy Based Governance
privacy
pubcrawl
security
simulation
Vehicle to Grid
Vehicle-to-grid
biblio
ScalaCert: Scalability-Oriented PKI with Redactable Consortium Blockchain Enabled "On-Cert" Certificate Revocation
Submitted by aekwall on Fri, 01/13/2023 - 3:03pm
5G mobile communication
authentication
blockchains
Certificate Revocation
Compositionality
consortium Blockchain
data structures
Performance analysis
PKI system
pubcrawl
Public key
redactable blockchain
Scalability
security scalability
biblio
BYOZ: Protecting BYOD Through Zero Trust Network Security
Submitted by aekwall on Fri, 01/13/2023 - 2:52pm
network security
network security policy
BYOD
security policies
Continuous Authentication
zero trust
Pandemics
COVID-19
Companies
Human Factors
Resiliency
Metrics
Scalability
pubcrawl
authorization
authentication
privacy
biblio
Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism
Submitted by grigby1 on Fri, 01/06/2023 - 3:33pm
network-on-chip
System recovery
SystemC TLM
Recovery Mechanism
Systems architecture
MPSoC
Interference
Scalability
simulation
encryption
Program processors
Protocols
authentication
Resiliency
resilience
pubcrawl
security
biblio
A Reliable, Secure and Efficient Decentralised Conditional of KYC Verification System: A Blockchain Approach
Submitted by grigby1 on Fri, 01/06/2023 - 2:50pm
resilience
gas
fully homomorphic encryption (FHE)
blockchains
Resiliency
android encryption
Pressing
distributed ledger
ethereum
Schedules
Manuals
Law
authentication
Scalability
Metrics
Human behavior
pubcrawl
blockchain
biblio
Advanced Lightweight Encryption Algorithm for Android (IoT) Devices
Submitted by grigby1 on Fri, 01/06/2023 - 2:49pm
privacy
Lightweight
Resiliency
attack
Hazards
android encryption
android
Software algorithms
resilience
Receivers
Cryptography
encryption
authentication
Scalability
performance evaluation
Software
Heuristic algorithms
Metrics
Human behavior
pubcrawl
IoT
biblio
An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
Submitted by aekwall on Thu, 01/05/2023 - 4:12pm
reverse engineering
embedded systems
Internet of Things
authentication
Protocols
pubcrawl
Metrics
Resiliency
composability
Fingerprint recognition
Very large scale integration
sybil attacks
biblio
Blockchain Integration with end-to-end traceability in the Food Supply Chain
Submitted by grigby1 on Thu, 01/05/2023 - 1:29pm
supply chains
decentralized application
supply chain security
food security
Food industry
Supply Chain
blockchains
Traceability
reputation system
automation
blockchain
smart contracts
Performance analysis
Reliability
Computational modeling
authentication
Resiliency
resilience
pubcrawl
biblio
A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 5:29pm
composability
Wireless communication
security
secure group communication
resilience
Receivers
Protocols
performance evaluation
Optimized production technology
mobile ad-hoc networks
key management
authentication
Ad hoc networks
Ad Hoc Network Security
Access Control
Human behavior
Metrics
Resiliency
Scalability
pubcrawl
biblio
Towards a Novel and Efficient Public Key Management for Peer-Peer Security in Wireless Ad-Hoc/sensor Networks
Submitted by grigby1 on Fri, 12/09/2022 - 5:28pm
Servers
Peer-to-peer computing
pubcrawl
Metrics
resilience
Resiliency
network security
authentication
Protocols
Communication system security
composability
Ad hoc networks
wireless networks
Public key
peer-peer
Ad Hoc Network Security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »