Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
(WIP) Authenticated Key Management Protocols for Internet of Things
Submitted by aekwall on Mon, 05/20/2019 - 8:56am
key management
telecommunication security
Smart homes
Self-certified keys
security operations
security analysis show
seamless incorporation
Resiliency
Public key
pubcrawl
Protocols
noninteractive key management protocol
Metrics
authenticated key management protocols
IoT Security 2018
IoT
Internet of Things authentication
Internet of Things
interactive key management protocol
Human behavior
heterogeneous end systems
different end systems
data privacy
Cryptographic Protocols
composability
authentication
biblio
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
Submitted by aekwall on Wed, 05/01/2019 - 11:38am
identity-based encryption schemes
Telecommunications
standards
smart meters
smart cards
Scalability
Resiliency
public key cryptography
pubcrawl
performance evaluation
pairing-based elliptic curve cryptography
Metrics
Bilinear Pairing
group signatures
embedded devices
Elliptic curves
Elliptic curve cryptography
digital signatures
Cryptography
Cryptographic Protocols
cryptographic libraries
Constrained Devices
bilinear pairing operation
biblio
In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild
Submitted by aekwall on Wed, 05/01/2019 - 11:37am
Libraries
twist attacks
transport protocols
transport layer protocol
TLS handshake
standards
SSH hosts
Servers
server vulnerability
Scalability
Resiliency
pubcrawl
Protocols
Metrics
Cryptographic Protocols
IPsec
invalid curve attacks
internet-wide scans
internet scanning
internet
HTTPS hosts
Elliptic curves
elliptic curve parameter downgrade attack
Elliptic curve cryptography
CurveSwap attack
curve validity checks
curve twist attacks
biblio
Multi-mode Cryptocurrency Systems
Submitted by aekwall on Mon, 04/01/2019 - 9:04am
pubcrawl
blockchain
blockchain security
cryptocurrency
Cryptographic Protocols
biblio
Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps
Submitted by aekwall on Mon, 03/25/2019 - 8:57am
Metrics
Zigbee
WSN security
wireless sensor networks
wireless security
wireless communication devices
Wireless communication
telecommunication security
sensor security
Resiliency
pubcrawl
poor wireless communication
performance evaluation
mutual authentication
authentication
low-performance sensors
low performance communication ability
lightweight mutual authentication
key agreement
IoT security
IoT network
Internet of Things
Human behavior
high-quality communication
Cryptographic Protocols
composability
communication functions
biblio
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM
Submitted by aekwall on Mon, 03/18/2019 - 8:53am
key sizes
black box encryption
quantum random oracle models
quantum cryptography
quantum computing
public key cryptography
Public key
postquantum security
post-quantum cryptographic schemes
post-quantum cryptographic primitives
post quantum cryptography
module lattices
Learning with errors
Lattices
key-establishment protocols
key-encapsulation mechanism
digital signature
key encapsulation
CRYSTALS - Kyber
CPA-secure public-key encryption scheme
ciphertext sizes
CCA-secure module-lattice-based KEM
CCA-secure KEM
authenticated-key-exchange schemes
Metrics
composability
pubcrawl
Resiliency
Electronic mail
Protocols
Cryptographic Protocols
encryption
biblio
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier’s Perspective)
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
swarm
online learning
performance evaluation
Protocols
resource-constrained embedded devices
resource-efficient smart broadcast authentication scheme
smart devices
Software
software integrity checking
malware detection
Task Analysis
Trusted Party
WISE
Resiliency
Human behavior
pubcrawl
composability
fine-grained multiclusters
computer network security
Scalability
Internet of Things
attestation
Hardware
Remote Attestation
attack surface
Cryptographic Protocols
security
heterogenous IoT networks
History
intelligent swarm attestation protocol
interactive protocol
Internet of Things (IoT)
IoT applications
lightweight intelligent swarm attestation scheme
biblio
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
Submitted by grigby1 on Fri, 02/08/2019 - 3:35pm
smart meter
nonlight-weight protocol
portable access
pubcrawl
public key cryptography
Security analysis
smart cards
Smart Grid
smart grid technology
mobile computing
smart power grids
subsequent communication
telecommunication security
two factor authentication
two-factor lightweight user authentication scheme
two-factor user authentication
user anonymity
anonymous and untraceability
message authentication
Lightweight Encryption
lightweight anonymous mobile user authentication scheme
Human Factors
Human behavior
electric vehicle
data privacy
Cryptographic Protocols
critical security
communication process
cloud server
charging process
biometric encryption
authorisation
authentication process
biblio
An Efficient Oblivious Transfer Protocol with Access Control
Submitted by grigby1 on Thu, 01/31/2019 - 11:22am
illegal user access
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
privacy-preserving database
privacy
OTAC
Oblivious transfer
Access Control
Elliptic curve cryptography
efficient oblivious transfer protocol
data privacy
Cryptographic Protocols
authorisation
Asia
anonymous messaging
anonymous access
access control policy
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »