Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
biblio
\#x003BC;DTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
resilience
Metrics
microcontrollers
payload size
Payloads
performance evaluation
Protocols
pubcrawl
public key cryptography
man-in-the-middle attacks
Resiliency
Routing
secp128r1
secp192r1
secp256r1
security layer
store-carry-forward principle
μDTNSec
digital signatures
Asymmetric Encryption
asymmetric signatures
bundle protocol specification
Compositionality
Contiki OS
Cryptographic Protocols
delay tolerant networks
delay-disruption-tolerant networks
advanced encryption standard
disruption-tolerant networks
Elliptic curve cryptography
encryption
energy measurement
energy measurements
energy-constrained devices
hardware-backed symmetric encryption
Human behavior
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
biblio
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
sensor nodes
personal area networks
power consumption
Protocols
pubcrawl
remote server
resilience
Resiliency
resource-constrained sensors
S3K technique
Scyther security protocol verification tool
personal area network identification
sensors
Servers
session key distribution
symmetric key establishment method
telecommunication network routing
telecommunication power management
telecommunication security
trust anchor
wireless sensor networks
Cryptography
6LoWPAN wireless sensor networks
authentication
CBC mode
cipher block chaining
composability
Contiki
ContikiOS
Cooja Simulator
Cryptographic Protocols
6LoWPAN
Cyber Physical Systems Security
datagram transport layer security
DTLS
EAKES6Lo technique
Edge router
LAUP
lightweight authentication protocol
Lucky Thirteen attack
PAN ID
biblio
Towards an Efficient File Synchronization between Digital Safes
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Protocols
WebSocket protocol
WebSocket
web services
trees (mathematics)
synchronization protocol efficiency
Synchronization
SyncDS protocol
storage management
Servers
security
Secure File Sharing
Resiliency
resilience
pubcrawl
Cloud Computing
Networking Protocol
Metrics
metadata
Human behavior
HTML5 Local Storage API
hierarchical hash tree
file synchronization
Digital Safe
Cryptographic Protocols
Context
composability
cloud storage solutions
cloud service
biblio
Garbled Protocols and Two-Round MPC from Bilinear Maps
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
noninteractive zero-knowledge proof system
Yao's garbled circuits construction
witness encryption
universal composability
two-round UC secure protocol
two-round MPC
standards
Resiliency
resilience
Random access memory
random access machines
RAM programs
pubcrawl
Protocols
bilinear maps
multiparty secure computation protocols
Metrics
garbling arbitrary protocols
garbled protocol construction
encryption
encoding
distributed protocol
Cryptographic Protocols
Computational modeling
composability
Circuit Garbling
black box encryption
biblio
Secure Composition of PKIs with Public Key Protocols
Submitted by K_Hooper on Wed, 02/28/2018 - 11:32am
Public key
tools
telecommunication security
tagging
symbolic model
symbolic formal models
secure composition
public key protocols
public key infrastructures
public key cryptography
Composition
pubcrawl
Protocols
PKI
formal method
encryption
Cryptographic Protocols
Computational modeling
Compositionality
biblio
A Framework for Universally Composable Diffie-Hellman Key Exchange
Submitted by grigby1 on Tue, 02/27/2018 - 2:34pm
key exchange protocols
universal composability
standards
SIGMA
security of data
reduction proofs
pubcrawl
Protocol Security
protocols building
Protocols
OPTLS
composability
ISO 9798-3
IITM model
encryption
Diffie-Hellman key exchange
DH key exchange
DH-HEMTs
Cryptographic Protocols
cryptographic primitives
Computational modeling
biblio
A Universally Composable Treatment of Network Time
Submitted by grigby1 on Tue, 02/27/2018 - 2:34pm
pubcrawl
wide-spread security loss
universally composable treatment
universally composable security framework
universal composability
UC framework
time-reliant applications
Time measurement
Servers
security-sensitive systems
real-world protocols
real-world distributed system
real-time systems
public key infrastructure
Public key
authorisation
Protocols
password expiration
network time protocols
network time
modular treatment
internet
cryptographic tools
Cryptographic Protocols
cryptographic primitives
Consensus
composability
Clocks
certificate detection revocation
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »