Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Secure authentication on the Internet of Things
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
lightweight cryptographic algorithms
user credential protection
universal access
Servers
resource constrained environments
Resiliency
resilience
pubcrawl
Protocols
Phishing
mutual multifactor authentication
multifactor authentication
Metrics
memory requirements
man-in-the-middle attacks
authentication
Internet of Things
Human Factors
human factor
Human behavior
Cryptography
Cryptographic Protocols
confidential communications
Computer crime
code size
Ciphers
biometrics (access control)
biometrics
biometric-based cryptographic techniques
biometric authenticated key exchange protocol
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
Blockchain explorer: An analytical process and investigation environment for bitcoin
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Online banking
illicit trades
innovative decentralized architecture
invasive software
law administration
law enforcement
law enforcement investigation
law enforcement local environment
malware modus operandi
marketcap
illegal trades
pseudo anonymity
pubcrawl
Public key
Ransomware
real-time systems
Scalability
Training
USD
darknet marketplaces
bitcoin protocol network
bitcoin security
blockchain
blockchain explorer
Computer crime
computer network security
crime instances
cryptocurrency
Cryptographic Protocols
bitcoin analytical process
DDoS extortion
distributed ledger
financial data processing
graphical transaction relation
History
Human behavior
human factor
Human Factors
biblio
Zero-Collateral Lotteries in Bitcoin and Ethereum
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Human behavior
zero-collateral lotteries
tournament bracket construction
scripting language
Scalability
pubcrawl
Protocols
privacy
off-chain setup phase
Human Factors
human factor
authoring languages
Europe
Ethereum-based implementation
electronic money
Cryptographic Protocols
cryptocurrency-based lottery protocols
contracts
bitcoin security
Bitcoin implementation
bitcoin
biblio
Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
lost attack
verification stage
tamper attack
storage management
Servers
Scalability
Resiliency
remote data integrity checking protocols
quantum computer attacks
public key cryptography
pubcrawl
provably secure
Protocols
matrix-vector multiplication
matrix multiplication
matrix-matrix multiplication
Cloud Computing
Lattices
lattice-based constructed cryptography
Identity management
identity-based remote data integrity checking protocol
ID-Based cryptography
Human behavior
data privacy
Data models
data integrity checking
data integrity
Cryptography
Cryptographic Protocols
communication cost
cloud storage
cloud service provider attack
biblio
Chaining trusted links by deploying secured physical identities
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
pubcrawl
unclonable physical tokens
Trust management
trusted links
trusted link
Trust Chaining by Physical Tokens
smart devices
security of data
security chain
secured physical identities
Secret Unkown Cipher
secret unknown ciphers
Scalability
Resiliency
authentication
Protocols
physical clone-resistant identities
Object recognition
Internet of Things
intermediate node
Identity management
Human behavior
generic node authentication protocols
Cryptography
Cryptographic Protocols
clone-resistant physical identity
Ciphers
biblio
An IDMS approach towards privacy and new requirements in IoT
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
mobile clients
user-centric
service provider
Scalability
Resiliency
pubcrawl
private information
privacy
personal authentication device
PAD
OAuth
Mobility
mobile radio
AVISPA
IoT identity management system
Internet of Things
IDMS
Identity provider IoT
Identity management
Human behavior
EAP
DTLS
domain
data privacy
Cryptographic Protocols
Cardinality
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by grigby1 on Tue, 01/16/2018 - 5:26pm
Mobile handsets
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
DDoS
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
cellular identifiers
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
9-1-1 DDoS
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »