Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Improve the security over the wireless sensor networks in medical sector
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
Ciphers
WSN
RC4 algorithms
RC4
medical sector
hospital
data transfer integrity
data transfer confidentiality
data transfer availability
body sensor networks
AES algorithms
AES
Biomedical monitoring
hospitals
Monitoring
sensor security
secure protocol
internet
Metrics
component
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Research on End-to-End Security Authentication Protocol of NB-IoT for Smart Grid Based on Physical Unclonable Function
Submitted by aekwall on Mon, 02/17/2020 - 1:17pm
domestic cryptographic algorithm
smart power utilization
SM3
self-controllable NB-IoT application layer security architecture
security authentication protocol
secure data transmission
power network data transmission
power grid business platforms
Physical Unclonable Function
NB-IoT terminals
national strategic hot spot
narrow band internet of things
end-to-end security authentication protocol
electric power business
Scalability
end-to-end security
encryption keys
power engineering computing
Smart Grid
smart grid security
message authentication
smart power grids
Metrics
privacy
pubcrawl
Resiliency
Cryptographic Protocols
Internet of Things
biblio
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 11:04am
Human Factors
Xyreum
time-based zero-knowledge proof of knowledge
time-based zero knowledge proof of knowledge
mutual multifactor authentication
Industrial Internet of Things
enhanced IIoT security
computational complexity
computation complexity
blockchain-based security protocol
blockchain solutions
blockchain group decision-making process
blockchain designs
multifactor authentication
authenticated encryption
Privacy-preserving
security
Scalability
Distributed databases
Cyber Attacks
Decision Making
blockchain
Metrics
Cryptography
privacy
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
biblio
An efficient multi-factor authenticated key exchange with physically unclonable function
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
password
two factor authentication
Servers
secure PUF-MAKE protocol
secure physically unclonable function
Resiliency
PUF-MAKE setting
PUF-embedded device
PUF
pubcrawl
Protocols
authentication
multifactor authenticators
multifactor authentication
multifactor authenticated key exchange
Multi-factor authenticators
Metrics
message authentication
Key exchange
Human Factors
encryption
Cryptographic Protocols
biblio
A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
smart cards
session key disclosure attacks
secure multifactor remote user authentication scheme
secure multifactor authentication protocol
resource limited devices
Kalra's scheme
communication technology
cloud-IoT environment
cloud-IoT applications
biometrics (access control)
multifactor authentication
Human Factors
security problems
Cloud Computing
password
authentication
Metrics
pubcrawl
Resiliency
embedded devices
Protocols
Cryptographic Protocols
telecommunication security
Internet of Things
Big Data
authorisation
biblio
An Efficient Two-Server Password-Only User Authentication for Consumer Electronic Devices
Submitted by grigby1 on Mon, 02/10/2020 - 10:31am
Protocols
two-server password-only remote user authentication protocol
trust model
telecommunication security
SSL Trust Models
SSL
Smartphones
Servers
secure socket layer protocol
Scalability
Resiliency
resilience
pubcrawl
authentication
password
Metrics
message authentication
laptops
impersonation attacks
Human Factors
Human behavior
dictionary attacks
Dictionaries
Cryptographic Protocols
Consumer electronics
consumer electronic devices
biblio
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Submitted by grigby1 on Mon, 02/10/2020 - 10:30am
secure socket layer
mobile radio
multiattribute associated fingerprints
multiple-attribute-based encrypted traffic classification
network management
pattern classification
Protocols
pubcrawl
resilience
Resiliency
Scalability
mobile network applications
security of data
Servers
SSL Trust Models
SSL/TLS
telecommunication security
telecommunication traffic
Training
Transport Layer Security
video streaming
encrypted protocol detection
application runtime
application-level traffic classification
attribute-lacking problem
certificate
classification guidance information
communication security
Correlation
Cryptographic Protocols
Cryptography
domain name
application data
Encrypted traffic classification
encrypted traffic classification methods
encrypted video stream classification
handshake certificates
Human behavior
Human Factors
MAAF
Markov processes
Metrics
biblio
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
3G mobile communication
user authentication
unitary authentication model
telecommunication security
security levels
Scalability
resilience
quality of service
pubcrawl
multiservice system
multimedia interaction
mobility management (mobile radio)
mobile industry automation
late-model services
Internet of Vehicles
Identity management
identity authentication methods
3GPP committee
5G mobile communication
5G multiservice systems
5G network platform
composable three-factor authentication mechanism
Cryptographic Protocols
differentiated services
diversified identity authentication mechanism
diversified identity management
diversified security requirements
extensible authentication protocol
future fifth-generation mobile communications system
high definition visual communication
Human behavior
biblio
Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
pervasive computing devices
user anonymity
user privacy
encoding
cloud-based servers
configurable anonymous authentication schemes
device-user authentication parameters
IoT authentication
IoT testbed
power consumption
privacy-preserving authentication schemes
smart home occupancy
VCSE-based approach
verifiable common secret encoding
zero knowledge proof
ZKP-based approach
zero trust
computer network security
Human Factors
IoT infrastructure
radiofrequency identification
anonymity
authentication
Cryptography
privacy
policy-based governance
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
Scalability
biblio
Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network
Submitted by aekwall on Mon, 01/20/2020 - 11:12am
trustless network
Hash functions
initial trust setup phase
interactive zero knowledge proof
post quantum attacks
PoW
secure digital service payments
SHA3-finalists
tokenized assets
trusted third party
financial transactions
TTP
Witness Indistinguishability
Zcash
zero knowledge proof
zero knowledge proof method
ZKSNARK
ZKSTARK
zero trust
cryptocurrencies
Scalability
data confidentiality
Cryptographic Protocols
Resiliency
pubcrawl
policy-based governance
bitcoin
blockchain
security of data
smart contracts
multiparty computation
Proof-of-work
distributed network
Human Factors
blockchain ecosystem
enterprise applications
fair exchange
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »