Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
A Creation Cryptographic Protocol for the Division of Mutual Authentication and Session Key
Submitted by grigby1 on Tue, 07/12/2022 - 3:23pm
Cryptographic Protocols
authentication and session key
policy governance
cryptology
Algorithm
Asymmetric
Communications technology
information science
standards
Compositionality
Cryptography
Metrics
composability
authentication
Safety
Resiliency
resilience
pubcrawl
Monitoring
collaboration
biblio
Identity Authentication Based on Domestic Commercial Cryptography with Blockchain in the Heterogeneous Alliance Network
Submitted by aekwall on Tue, 04/19/2022 - 11:17am
Cryptography
blockchain
authentication
encryption
Resiliency
composability
standards
component
Cryptographic Protocols
pubcrawl
Domestic commercial cryptography
Heterogeneous alliance network
identity authentication
zero knowledge proof
Cross Layer Security
biblio
Towards Formal Modeling and Analysis of UPI Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 12:30pm
Manuals
UPI
tools
standards
Servers
pubcrawl
protocol verification
privacy
policy-based collaboration
Adaptation models
formal methods
Financial Security
Cryptographic Protocols
Compositionality
composability
collaboration
Analytical models
biblio
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting
Submitted by aekwall on Tue, 10/12/2021 - 3:12pm
authorization
Compositionality
Cryptographic Protocols
OAuth
Predictive Metrics
provable security
pubcrawl
Resiliency
security model
biblio
Verifying cryptographic protocols by Tamarin Prover
Submitted by aekwall on Tue, 10/12/2021 - 3:08pm
security
Cryptography
Computational modeling
privacy
pubcrawl
composability
Complexity theory
Compositionality
policy-based governance
Cryptographic Protocols
formal specifications
Planing
Session key secrecy
Tamarin prover
Verification of cryptographic protocols
protocol verification
biblio
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Submitted by grigby1 on Wed, 06/02/2021 - 12:30pm
Complexity theory
Computational modeling
Control Theory
Cryptographic Protocols
Cryptography
Human behavior
Information-Theoretic Cryptography
Protocols
pubcrawl
resilience
Resiliency
Round Complexity
Scalability
Secure computation
security
Task Analysis
biblio
Automating Compositional Analysis of Authentication Protocols
Submitted by aekwall on Tue, 06/01/2021 - 1:19pm
Servers
Protocols
pubcrawl
composability
authentication
Cryptographic Protocols
Compositionality
design automation
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
error correction codes
pollution attack
Pollution
network error correction
network coding security
information-theoretic approach
Information rates
cryptographic signature
cryptographic approach
information theoretic security
multicast communication
Upper bound
error correction
network coding
Scalability
computer networks
information security
information theory
Metrics
Cryptography
wireless sensor networks
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
biblio
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
probability
information theoretic security
unconditional security
symmetric-key encryption
Shannon's perfect secrecy
security quantities
security formalizations
relaxed perfect secrecy
perfect secrecy
information-theoretic indistinguishability
Information-Theoretic Cryptography
composable security
semantic security
Indistinguishability
Semantics
Scalability
key agreement
information-theoretic security
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
secret keys
private key cryptography
encryption
biblio
Research on Decentralized Identity and Access Management Model Based on the OIDC Protocol
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
Identity management
unified authentication service
Scalability
Resiliency
resilience
reliable authentication service
pubcrawl
personal security information
personal information security problems
personal identity access management model
OIDC protocol
message authentication
access management application cluster
identity information
Human behavior
encryption services
decentralized identity authentication
Decentralized ID
Cryptographic Protocols
certificate authority
authorisation
authentication rules
application system
1
2
3
4
5
6
7
8
9
…
next ›
last »