Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
GDH
biblio
Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+
Submitted by grigby1 on Mon, 12/30/2019 - 2:19pm
Mathematical model
TLA+
TLA
Silicon
Scalability
Resiliency
pubcrawl
ProVerif
protocol correctness
pre-meditated correctness
passive attacker
mutual key
communicating parties
liveness property
key agreement protocol verification
ING
GDH
formal verification
exponentiation
divide and conquer key distribution protocol
DC DHKE
Cryptography
Cryptographic Protocols
contributory group key agreement
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
Security of Okamoto Identification Scheme: A Defense Against Ephemeral Key Leakage and Setup
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
composability
Compositionality
ephemeral random values
GDH
Identification
impersonation
leakage
Metrics
Okamoto scheme
provable security
pubcrawl
resilience
Resiliency
security reduction
simulatability