Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
A Robust Anonymity Preserving Authentication Protocol for IoT Devices
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
message authentication
telecommunication security
Servers
security mechanisms
robust anonymity preserving authentication protocol
Resiliency
resilience
radiofrequency identification
public key cryptography
pubcrawl
Protocols
privacy
online threat
Metrics
anonymity
lightweight authentication
IoT devices
Internet of Things
Human Factors
Human behavior
Generators
efficient public key cryptography mechanism
ECC
data privacy
Cryptographic Protocols
composability
authentication
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
private key cryptography
Internet of Things
key agreement
key agreement protocol
low key generation rate
Mobile handsets
Nexus 5X
Nexus 6P
physical response interval
pre-built fingerprint database
Human behavior
pubcrawl
redundancy time cancellation
Resiliency
secure key agreement
security
smart phones
symmetric key
telecommunication security
composability
acoustic communication
Acoustic Fingerprints
Acoustics
authentication
bidirectional initial authentication
coding scheme
commercial mobile devices
commodity mobile devices
commodity smartphones
acoustic channel response
Cryptographic Protocols
device authentication
Device-to-device communication
encoding
fast device authentication
fast signal detection
GeneWave
Hardware
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
mobile radio
wireless mesh networks
Wireless communication
Ultra-fast handoff authentication protocol
UFAP
trust-based
token-based authentication protocol
token-based
ticket-based
telecommunication security
Servers
resilience
pubcrawl
Protocols
mobility management (mobile radio)
authentication
mobile devices
Metrics
IEEE 802.11s
id-based
handoff authentication protocol
Handoff
extensible authentication protocol
EAP-TLS
EAP-PEAP
delays
Cryptography
Cryptographic Protocols
composability
Communication system security
biblio
Hardware Security Threats Against Bluetooth Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:05pm
hardware security threats
wireless mesh networks
smartphone platforms
security protocol
resilience
pubcrawl
physical attacks
network topology
Metrics
mesh topology
Mesh networks
Internet of Things
authentication
Hardware Security
encryption
Cryptographic Protocols
composability
Bluetooth special interest group
Bluetooth mesh networks
Bluetooth mesh
bluetooth low energy
Bluetooth
BLE technology
BLE networks
biblio
A New Key Exchange Algorithm over a VLC Indoor Channel
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Neural Synchronization
VLC indoor channel
VLC
Visible Light Communications Security
visible light communication indoor channel
tree parity machine synchronization
Synchronization
synchronisation
stimulus vector
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
neuronal synchronization
average synchronization time t_sync
Metrics
key exchange algorithm
indoor communication
hyperelliptic curves
GF(2n)
Galois fields
Galois field
free-space optical communication
Diffie-Hellman protocol
DH-HEMTs
cryptosystem security
Cryptography
Cryptographic Protocols
Biological neural networks
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
telecommunication network reliability
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
pubcrawl
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
encryption
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
coding scheme reliability
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »