Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Single Trace Side Channel Analysis on Quantum Key Distribution
Submitted by grigby1 on Tue, 10/08/2019 - 3:45pm
Resiliency
quantum computer
quantum computing
quantum cryptography
Quantum Key Distribution
quantum physics
quantum properties
random key generation
random number generation
resilience
QKD system
Scalability
Secret key
Side-channel attack
side-channel attacks
single electromagnetic trace
Single Trace Attack
single trace side channel analysis
stable key generation
weak random number generators
Phase modulation
Cryptographic Protocols
Diffie-Hellman key exchange
Electromagnetics
EM analysis
Human behavior
key exchange protocols
Metrics
number theoretic problems
number theory
BB84 protocol
phase modulator
Photonics
plug-and-play
plug-and-play QKD system
private key cryptography
Protocols
pubcrawl
QKD
biblio
Quantum IoT: A Quantum Approach in IoT Security Maintenance
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
quantum mechanics laws
pubcrawl
Quantum approach
quantum channel
quantum communication
quantum computing
quantum computing security
quantum cryptography
quantum cryptography BB84 protocol
Quantum IoT
Protocols
quantum state
Qubit
resilience
Resiliency
Scalability
security of data
Security Processing Security
telecommunication security
greater security design
classical communication
Cloud Computing
complex management
composability
Cryptographic Protocols
data dynamics
data generation process
data storage
BB84 protocol
hybrid management
Internet of Things
IoT security infrastructure
IoT security maintenance
Metrics
One Pad Cryptography
Predictive Metrics
privacy
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
potential attacks
Supply Chain
SQL injection attack
SQL
Servers
security
RFIDs
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification technology
pubcrawl
Protocols
privacy
access control system
identity related information
Human Factors
Human behavior
high security demand
distributed system
distributed RFID systems
distributed environment
Cryptographic Protocols
credit card
Computers
blockchain-based mutual authentication security protocol
blockchain
authorisation
authentication
biblio
A Secure and Efficient Parallel-Dependency RFID Grouping-Proof Protocol
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
pubcrawl
telecommunication security
Sundaresan grouping-proof protocols
serial-dependent grouping-proof protocol
security
Scalability
robust privacy mechanisms
RFIDs
RFID tagged objects group
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification
Cryptographic Protocols
Protocols
privacy
parallel-dependency RFID grouping-proof protocol
parallel-dependency grouping-proof protocol
parallel protocol
missing tags
improved offline protocol
Human Factors
Human behavior
grouping-proofs
Elliptic curve cryptography
data privacy
biblio
Lightweight Security Protocol for Chipless RFID in Internet of Things (IoT) Applications
Submitted by grigby1 on Wed, 10/02/2019 - 2:02pm
privacy
tag/reader anonymity
security
Secuity
RFIDs
RFID tags
RFID based communication
RFID
Resiliency
resilience
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
BASYS 2 FPGA board based platform
lightweight security protocol
lightweight collision free algorithm
IoT
Internet of Things
Human Factors
Human behavior
field programmable gate arrays
Databases
Cryptographic Protocols
chipless RFID tag based system
chipless RFID system
Chipless RFID
broader IoT framework
biblio
A Cryptographic Look at Multi-party Channels
Submitted by aekwall on Mon, 09/23/2019 - 9:26am
multiparty channels
broadcast channels
broadcast communication
channel security
confidential communication
cryptographic channels
FSE17-ToSC17
full-fledged broadcast channel
game-based authenticity
Group communication
bidirectional communication
point-to-point link
point-to-point links
protocol
secure-channels
Security Properties
standard cryptographic primitives
unidirectional links
Compositionality
Reliability
Servers
encryption
Cryptographic Protocols
Protocols
provable security
Resiliency
pubcrawl
internet
computer network security
Predictive Metrics
-broadcast-communication
-causality-preservation
-confidentiality
-integrity
authenticated communication
authenticated encryption
bidirectional channel
biblio
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Submitted by aekwall on Mon, 09/23/2019 - 9:25am
Predictive Metrics
wireless sensor networks
user impersonation attack
user anonymity
telecommunication security
sensor network characteristics
secure communication
Resiliency
pubcrawl
provable user authentication scheme
provable security
Protocols
privacy-preserving user authentication protocol
privacy-preserving cryptanalysis
authentication
password change phase
password
mobile devices
message authentication
Logic gates
key agreement
Internet of Things security
Internet of Things
Elliptic curves
Elliptic curve cryptography
data privacy
Cryptographic Protocols
Compositionality
biblio
A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
Predictive Metrics
national cryptographic algorithm
network layer communication security
network security
Networked Control Systems Security
power distribution automation system
power distribution network system
power distribution protection
power engineering computing
power system security
Microelectronics Security
Protocols
pubcrawl
resilience
Resiliency
security protection scheme
sercurity chip
the power distribution automation system
Virtual private networks
VPN gateway
Distribution system
authentication function
authentication gateway
authorisation
composability
computer network security
Cryptographic Protocols
distribution application layer encryption authentication device
distribution master station
distribution network system
authentication
Dual Encryption
encryption
IP networks
IPSec protocol
IPSec security chip
Logic gates
master cipher machine
master system
Metrics
biblio
Security-Enhanced Signaling Scheme in Software Defined Optical Network
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
security level
pubcrawl
public key cryptography
public key infrastructure
resilience
Resiliency
SDON
security
security improvement
Protocols
security-enhanced signaling
security-enhanced signaling procedure
Software
software defined networking
Software Defined Networks
software defined optical network
telecommunication security
telecommunication signalling
internet
communication security issue
composability
connection success rate performance
Cryptographic Protocols
current OpenFIow protocol
digital signatures
end-to-end trusted service connection
Energy Internet services
backbone optical networks
large-scale optical network
message feedback
Metrics
Microelectronics Security
openflow protocols
Optical feedback
Optical fiber networks
optical switches
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »