Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Demonstrating Quantum Advantage in Security and Efficiency with Practical Photonic Systems
Submitted by aekwall on Mon, 03/30/2020 - 10:41am
entangled resources
quantum computing security
telecommunication network infrastructures
secret key distribution
quantum optics
quantum networks
quantum money
Quantum entanglement
quantum advantage
practical photonic systems
Photonics
photonic systems
maximal security guarantees
future quantum-safe communications
Scalability
central quantum network protocols
quantum communication
network environment
Predictive Metrics
quantum cryptography
quantum computing
composability
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Cryptography
biblio
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Submitted by grigby1 on Mon, 03/23/2020 - 3:16pm
pubcrawl
Web server
untrusted networks
untrusted environments
telecommunication control
tailoring onion routing
Servers
secret supply chain procedures
Routing
Router Systems Security
resource-constrained IoT devices
resource-conserving access control
Resiliency
resilience
computer network security
Protocols
protocol incompatibilities
Metrics
IoT device owner
IoT communication
Internet of Things
Internet connectivity
end-to-end security
data privacy
Cryptography
Cryptographic Protocols
cryptographic processing
biblio
Learning Automata Based Secure Multi Agent RFID Authentication System
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
RFID tags
RFIDs
utility function
technological developments
Scyther
RFID technologies
RFID scenario
multiagent intelligent system
Multi Agent
long term benefit
learning automata
expertly transfer utility
automata based secure multiagent RFID authentication system
RFID system
security
radiofrequency identification
sensitive data
RFID
authentication
privacy
multi-agent systems
radio frequency identification
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
key generation
random key generation
session key generation
repeated random numbers
randomized numbers
random sequence
pseudorandom number generator algorithm
Pseudo-Random Numbers
PRNG seed
PRNG
NIST Test Suite
Linear Congruential Generator algorithm
Linear Congruential Generator
LCG algorithm
Scalability
entropy source epoch timestamp
Random sequences
Authentication schemes
cryptographic algorithm
random number generation
Entropy
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Scalable Distributed Random Number Generation Based on Homomorphic Encryption
Submitted by aekwall on Mon, 03/16/2020 - 9:40am
Metrics
verifiable random functions
verifiable random function
scalable verification
scalable distributed random number generation
Scalability
Resiliency
random number generation
random key generation
random beacons
publicly-verifiable randomness
public key cryptography
pubcrawl
Predictive Metrics
blockchain based applications
mathematical operations
Human behavior
Homomorphic encryption
encrypted data
elliptic curve multiplications
Elliptic curve cryptography
distributed network
distributed ledgers
decentralized schemes
Cryptographic Protocols
Compositionality
blockchain context
biblio
A Blockchain-Based Traffic Conditions and Driving Behaviors Warning Scheme in the Internet of Vehicles
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
internet
blockchain
blockchain-based traffic conditions
computer network security
congestion problems
cryptocurrencies
Cryptographic Protocols
Distributed databases
economic development
group signature
group signature-based authentication time protocol
intelligent traffic terminals
warning scheme
Internet of Things
Internet of Vehicles
pubcrawl
resilience
Resiliency
road condition information
Scalability
signature based defense
telecommunication traffic
third-party certification
vehicular ad hoc networks
biblio
An Access Authentication Algorithm Based on a Hierarchical Identity-Based Signature over Lattice for the Space-Ground Integrated Network
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
SGIN
lattice based mobile access authentication mechanism
lattice-based cryptography
Lattices
mobile access authentication protocol
mobile radio
mobile users
multi-access systems
private key cryptography
Protocols
L-HIBS scheme
shared session key exchange
SIS problem
small integer solution
space communication links
space-ground integrated network
standard security model
telecommunication security
theoretical cryptography
Compositionality
pubcrawl
access authentication
access authentication algorithm
adaptive selection messages
authentication
authentication delay
bidirectional authentication
composability
signature based defense
computer architecture
Cryptographic Protocols
Cryptography
digital signatures
Generators
hierarchical access authentication architecture
hierarchical identity-based cryptography
hierarchical identity-based signature
biblio
Information Theoretical Secure Key Sharing Protocol for Noiseless Public Constant Parameter Channels without Cryptographic Assumptions
Submitted by grigby1 on Wed, 03/04/2020 - 3:13pm
matrix algebra
theoretical cryptography
SNR
Signal to noise ratio
Shannon information
Quantization (signal)
pubcrawl
Protocols
protocol restrictions
private key cryptography
privacy amplification procedure
Privacy Amplification
privacy
physical layer security
noiseless public constant parameter channels
artificial noise
key sharing protocol
internet
information theoretical secure key sharing protocol
Eigenvalues and eigenfunctions
eigenvalues
eavesdropper channels
Cryptography
Cryptographic Protocols
cryptographic assumptions
constant parameter noiseless public channel
computer network security
Compositionality
composability
Bit error rate
biblio
Quantum Cryptography on IBM QX
Submitted by grigby1 on Wed, 03/04/2020 - 3:13pm
quantum key distribution protocol
pubcrawl
quantum
quantum bit commitment
quantum computation
quantum computers
quantum computing security
quantum computing
quantum cryptography
Quantum Key Distribution
Protocols
quantum machines
quantum protocols
Qubit
Resiliency
Scalability
security shifts
statistical analysis
telecommunication security
theoretical cryptography
distributed keys
BB84 protocol
BB84 theoretical expected results
classical computers
composability
Compositionality
computational power
Cryptographic Protocols
cryptographic solutions
Cryptography
BB84
electronic transactions
encoding functions
existing classical algorithms 100% breakable
IBM QX software
intended parties
Logic gates
mathematical complexity
practical implementation results
Predictive Metrics
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »