Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Interactive message transmission over adversarial wiretap channel II
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
Scalability
Policy
Protocols
pubcrawl
public key infrastructure
quantum computers
Random variables
Reliability
Resiliency
perfectly secure protocol family
security
telecommunication security
two-way wiretap II channel
Upper bound
wireless channels
wireless setting
Wyner wiretap II model
information theoretic security
adversarial noise
adversarial wiretap channel II
collaboration
composability
Conferences
Cryptographic Protocols
Human behavior
human factor
active adversary
interactive message transmission
interactive protocols
Jamming
jamming signal
Metrics
Mobile communication
perfect information theoretic security
biblio
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
pubcrawl
information-theoretic security
Metrics
multiparty cryptographic protocols
nonprogrammable random choices
oracle knowledge
party private count retrieval protocol
Policy
Protocols
information theoretic security
random oracle model
real-ideal paradigm
Resiliency
Scalability
security of data
Servers
Upper bound
adaptive adversaries
human factor
Human behavior
honest-but-curious security
games approach sequence
Games
game theory
game parameters
EASYCRYPT proof assistant
Databases
Cryptography
Cryptographic Protocols
concrete upper bounds
composability
Complexity theory
collaboration
biblio
Novel remote authentication protocol using heart-signals with chaos cryptography
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Heart beat
session-oriented attacks
secure encryption
Resiliency
remote entity authentication protocol
pubcrawl
one-time pad encryption
Metrics
heart-signals
heart biometrics randomness
authentication
feature extraction
encryption
Cryptographic Protocols
composability
chaotic logistic maps
chaotic cryptography
chaos cryptography
chaos
biometrics (access control)
biblio
Formal Computational Unlinkability Proofs of RFID Protocols
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
pubcrawl
unlinkability
Turing machines
tools
Theorem Proving
security protocols
security of data
RFIDs
RFID protocols
RFID
Resiliency
radiofrequency identification
communication complexity
Protocols
Human Factors
Human behavior
Hash functions
formal computational unlinkability proofs
Cryptography
Cryptographic Protocols
Computational modeling
computational model
computational complete symbolic attacker
biblio
A lightweight RFID authentication protocol with confidentiality and anonymity
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy
telecommunication security
RFIDs
RFID tags
RFID system
RFID
Resiliency
replay attack
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
protocol
privacy and security
authentication
open wireless radio wave
on-chip CRC function
low-cost passive tags
location trace
lightweight RFID authentication protocol
Internet of Things
Human Factors
Human behavior
Hash functions
eavesdropping prevention
DOS-attack prevention
Cryptography
Cryptographic Protocols
CRC
biblio
Review of covert channels over HTTP: Communication and countermeasures
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
message content confidentiality
Uniform resource locators
ubiquitous HTTP message
transport protocols
timing
Technological innovation
Servers
Scalability
Resiliency
Receivers
pubcrawl
Protocols
networks
Browsers
internet
HTTP
detection
data leakage
Cryptography
Cryptographic Protocols
covert information container
covert communication method
covert channels
covert channel
Compositionality
capacity
biblio
A Practical One-Time File Encryption Protocol for IoT Devices
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
security issues
OTFEP
privacy issues
Protocols
pubcrawl
Resiliency
Scalability
scalable one-time file encryption protocol
secure key distribution mechanism
node scalability
security protocol
Servers
small file
specialized security requirements
stream file
system manager
third-party auditors
file encryption
cryptographic techniques
data privacy
Data protection
database
database management systems
Electronic mail
Elliptic curve cryptography
encryption
Cryptographic Protocols
file organisation
file protection
Internet of Things
IoT
IoT devices
IoT environment
Metrics
biblio
A new elliptic curve cryptographic system over the finite fields
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
pubcrawl
matrix algebra
Menezes Qu Vanstone encryption protocols
message authentication
Metrics
network communications
private key cryptography
private key matrices
Protocols
Mathematical model
public key cryptography
public key vectors
Resiliency
Scalability
secure communication
security
square matrices
Cayley Hamilton theorem
key exchange authentication
invertible matrix
finite fields
encryption
Elliptic curves
Elliptic curve cryptography
elliptic curve cryptographic system
ElGamal
ECC
Discrete Logarithms Problems
discrete logarithms
Diffie Hellman protocol
cyber security
cryptosystems
Cryptographic Protocols
biblio
Evolving side-channel resistant reconfigurable hardware for elliptic curve cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Metrics
Xilinx Kintex-7 FPGA
timing attacks
side-channel resistant reconfigurable hardware
side-channel attacks
security-level
Scalability
Resiliency
reconfigurable hardware design
public-key cryptosystems
public key cryptography
pubcrawl
propagation delay minimization
power analysis attacks
noninvasive side channel attacks
minimisation
Algorithm design and analysis
Hardware
genetic algorithms
genetic algorithm
fitness function
field programmable gate arrays
Evolutionary algorithm
Elliptic curves
elliptic curve discrete logarithm
Elliptic curve cryptography
elliptic curve cryptographic hardware
elliptic curve cryptographic combinational logic circuits
Cryptographic Protocols
cryptographic applications
combinational circuits
circuit size minimization
biblio
Mutual Authentication Protocol for RFID Based on ECC
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Public key
tracking attacks
telecommunication security
system internal attack
Servers
security scalability
security protocol
Scalability
RFID systems
Resists
Resiliency
radiofrequency identification
radio frequency identification
authentication
pubcrawl
Protocols
mutual authentication protocol
mutual authentication
Metrics
Internet of things security and privacy
forward security
Elliptic curve cryptography
ECC
Denial of Service attacks
Cryptographic Protocols
camouflage attacks
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »