Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Authentication schemes
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 9:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
key generation
random key generation
session key generation
repeated random numbers
randomized numbers
random sequence
pseudorandom number generator algorithm
Pseudo-Random Numbers
PRNG seed
PRNG
NIST Test Suite
Linear Congruential Generator algorithm
Linear Congruential Generator
LCG algorithm
Scalability
entropy source epoch timestamp
Random sequences
Authentication schemes
cryptographic algorithm
random number generation
Entropy
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 3:46pm
Fog computing
telecommunication security
Servers
security system
security service
security places
security
Scalability
Resiliency
pubcrawl
latency problems
latency issues
fog-computing requirements
fog servers
Fog Computing and Security
authentication
entry point
end devices
efficient mutual authentication scheme
edge resources
edge devices
edge computing
Cryptography
Cryptographic Protocols
computer architecture
cloud computing services
Cloud Computing
Authentication schemes
Authentication Protocols
biblio
One-Message Unilateral Entity Authentication Schemes
Submitted by grigby1 on Thu, 05/24/2018 - 11:18am
Authentication schemes
composability
Compositionality
Metrics
one-time password
provable security
pubcrawl
resilience
Resiliency